CVE-2023-32323
Python vulnerability analysis and mitigation

Overview

Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foundation. A vulnerability was discovered where a malicious user on a Synapse homeserver X with permission to create certain state events could disable outbound federation from X to an arbitrary homeserver Y. The vulnerability affects versions up to and including 1.73, while instances with federation disabled are not affected. The issue was disclosed in May 2023 and assigned identifier CVE-2023-32323 (Matrix Advisory).

Technical details

The vulnerability stems from Synapse not limiting the size of invite_room_state fields in room invites. This allowed the creation of arbitrarily large invite events. When such an oversized invite event was acknowledged by an invitee's homeserver, it would be sent in a batch of events that could be rejected as too large, effectively causing X's outgoing traffic to Y to become 'stuck'. The vulnerability has been assigned a CVSS v3.1 base score of 5.0 MEDIUM (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L) and is classified as CWE-20 (Improper Input Validation) (NVD).

Impact

When exploited, this vulnerability could cause messages and state events created by the affected homeserver X to remain unseen by the target homeserver Y, effectively disrupting federation between the two servers. The impact is particularly significant as it affects the core functionality of Matrix's federated architecture (Matrix Advisory).

Mitigation and workarounds

The vulnerability was patched in Synapse version 1.74, which refuses to create oversized invite_room_state fields. Server operators are urged to upgrade to Synapse 1.74 or newer. As a partial mitigation, Synapse operators can disable open registration to limit attackers' ability to create new accounts. If a server has been attacked, restarting it will resume outgoing federation through 'catchup mode', though this is not a permanent solution as the attack can be repeated (Matrix Advisory).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22033HIGH8.6
  • PythonPython
  • label-studio
NoNoJan 12, 2026
CVE-2025-68472HIGH8.1
  • PythonPython
  • mindsdb
NoYesJan 12, 2026
CVE-2026-22251MEDIUM5.3
  • PythonPython
  • wlc
NoYesJan 12, 2026
CVE-2026-22691LOW2.7
  • PythonPython
  • pypdf
NoYesJan 10, 2026
CVE-2026-22250LOW2.5
  • PythonPython
  • wlc
NoYesJan 12, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management