Use of Hard-coded Cryptographic Key Affecting org.apache.syncope.core:syncope-core-persistence-jpa package, versions [,3.0.15)[4.0.0-M0, 4.0.3)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.07% (21st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGAPACHESYNCOPECORE-14105148
  • published25 Nov 2025
  • disclosed24 Nov 2025
  • creditClemens Bergmann

Introduced: 24 Nov 2025

NewCVE-2025-65998  (opens in a new tab)
CWE-321  (opens in a new tab)

How to fix?

Upgrade org.apache.syncope.core:syncope-core-persistence-jpa to version 3.0.15, 4.0.3 or higher.

Overview

org.apache.syncope.core:syncope-core-persistence-jpa is an Open Source system for managing digital identities in enterprise environments, implemented in Java EE technology and released under Apache 2.0 license.

Affected versions of this package are vulnerable to Use of Hard-coded Cryptographic Key in the password encryption process. An attacker can recover original cleartext password values by accessing the internal database content, as the encryption key is hard-coded and publicly known.

Note: AES encryption is not the default option.

CVSS Base Scores

version 4.0
version 3.1