VYPR
Moderate severityNVD Advisory· Published May 26, 2023· Updated Feb 13, 2025

Synapse Outgoing federation to specific hosts can be disabled by sending malicious invites

CVE-2023-32323

Description

Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foundation. A malicious user on a Synapse homeserver X with permission to create certain state events can disable outbound federation from X to an arbitrary homeserver Y. Synapse instances with federation disabled are not affected. In versions of Synapse up to and including 1.73, Synapse did not limit the size of invite_room_state, meaning that it was possible to create an arbitrarily large invite event. Synapse 1.74 refuses to create oversized invite_room_state fields. Server operators should upgrade to Synapse 1.74 or newer urgently.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Malicious users can disable outbound federation from a Synapse homeserver by crafting oversized invite events, fixed in version 1.74.

Vulnerability

CVE-2023-32323 is a flaw in Synapse, the open-source Matrix homeserver. The root cause is that Synapse versions up to and including 1.73 did not enforce any size limits on the invite_room_state field within invite events [2]. This allowed any user with permission to create certain state events to generate an arbitrarily large invite event, which could then be used to disrupt outbound federation.

Exploitation

An attacker must be a malicious user on a Synapse homeserver X and have permission to create state events (typically a room admin or moderator) [2]. The attack does not require authentication from external servers; it targets the sending server's own processing of invite events. By crafting an oversized invite_room_state, the attacker can cause the server to fail when sending the invite to another homeserver Y, effectively disabling outbound federation from X to Y. Synapse instances with federation disabled are not affected [2].

Impact

A successful attack allows the malicious user to selectively break federation between their homeserver and any arbitrary target homeserver Y [2]. This can isolate users on Y from communicating with users on X, breaking interoperability that is central to the Matrix protocol. The impact is limited to outbound federation; inbound federation is not affected by this vulnerability.

Mitigation

Synapse 1.74, released on 2022-12-13, refuses to create oversized invite_room_state fields, closing the attack vector [1][2]. Server operators are urged to upgrade to Synapse 1.74 or newer urgently [2]. No workaround is available for earlier versions, as the fix requires server-side enforcement of size limits.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
matrix-synapsePyPI
< 1.74.01.74.0

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.