Synapse's invalid device keys degrade federation functionality
Package
Affected versions
< 1.138.3
>= 1.139.0rc2, < 1.139.1
Patched versions
1.138.3
1.139.1
Description
Published by the National Vulnerability Database
Oct 8, 2025
Published to the GitHub Advisory Database
Oct 8, 2025
Reviewed
Oct 8, 2025
Last updated
Oct 8, 2025
Impact
Lack of validation for device keys in Synapse before 1.138.3 and in Synapse 1.139.0 allow an attacker registered on the victim homeserver to degrade federation functionality, unpredictably breaking outbound federation to other homeservers.
Patches
Patched in Synapse 1.138.3, 1.138.4, 1.139.1, and 1.139.2.
Note that even though 1.138.3 and 1.139.1 fix the vulnerability, they inadvertently introduced an unrelated regression. For this reason, it is recommend to skip these releases and upgrading straight to 1.138.4 and 1.139.2.
Workarounds
The vulnerability can only be exploited by users registered on the victim homeserver.
References