CVE-2020-26890
Description
Matrix Synapse before 1.20.0 erroneously permits non-standard NaN, Infinity, and -Infinity JSON values in fields of m.room.member events, allowing remote attackers to execute a denial of service attack against the federation and common Matrix clients. If such a malformed event is accepted into the room's state, the impact is long-lasting and is not fixed by an upgrade to a newer version, requiring the event to be manually redacted instead. Since events are replicated to servers of other room members, the impact is not constrained to the server of the event sender.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Matrix Synapse before 1.20.0 mishandles non-standard JSON values in room member events, enabling a persistent denial of service across the federation.
Vulnerability
Description Matrix Synapse versions prior to 1.20.0 incorrectly allow non-standard JSON values such as NaN, Infinity, and -Infinity in fields of m.room.member events [1][2]. The root cause is that the application fails to validate or sanitize these IEEE 754 special float values, which are not part of the JSON specification. This oversight permits a specially crafted event to be accepted into a room's state [1].
Exploitation and
Attack Surface An attacker can exploit this vulnerability remotely without authentication by sending a malformed m.room.member event to a vulnerable Synapse server [1]. Since the event is then replicated to all other servers that are members of the same room via Matrix federation, the denial of service propagates to other homeservers and their users [1][2]. The attack requires no special network position or privileges; any federated room the attacker can join is a viable vector.
Impact
The acceptance of such a malformed event causes a Denial of Service (DoS) against the federation itself and common Matrix clients [1]. Clients that attempt to parse or render the affected room state may crash or become unresponsive. The impact is long-lasting: even if the server is upgraded to a patched version, the corrupted event remains in the room state and must be manually redacted by an administrator [1][2]. The effects are not limited to the attacker's server, affecting all participants in the room [1].
Mitigation
The vulnerability is fixed in Matrix Synapse version 1.20.0 [2]. Users should upgrade to this version or later to prevent new occurrences. However, rooms that already contain a malicious event require individual redaction of the offending event to restore normal service [1]. No workaround is available other than upgrading and cleaning existing state.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
matrix-synapsePyPI | < 1.20.0 | 1.20.0 |
Affected products
2- Matrix/Synapsedescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- github.com/advisories/GHSA-4mp3-385r-v63fghsaADVISORY
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G7YXMMYQP46PYL664JQUXCA3LPBJU7DQ/mitrevendor-advisoryx_refsource_FEDORA
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U34DPP4ZLOEDUY2ZCWOHQPU5GA5LYNUQ/mitrevendor-advisoryx_refsource_FEDORA
- nvd.nist.gov/vuln/detail/CVE-2020-26890ghsaADVISORY
- github.com/matrix-org/synapse/security/advisories/GHSA-4mp3-385r-v63fghsax_refsource_MISCWEB
- github.com/pypa/advisory-database/tree/main/vulns/matrix-synapse/PYSEC-2020-237.yamlghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G7YXMMYQP46PYL664JQUXCA3LPBJU7DQghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U34DPP4ZLOEDUY2ZCWOHQPU5GA5LYNUQghsaWEB
- pypi.org/project/matrix-synapseghsaWEB
News mentions
0No linked articles in our index yet.