VYPR
Moderate severityNVD Advisory· Published Jun 6, 2023· Updated Feb 13, 2025

URL deny list bypass via oEmbed and image URLs when generating previews in Synapse

CVE-2023-32683

Description

Synapse is a Matrix protocol homeserver written in Python with the Twisted framework. A discovered oEmbed or image URL can bypass the url_preview_url_blacklist setting potentially allowing server side request forgery or bypassing network policies. Impact is limited to IP addresses allowed by the url_preview_ip_range_blacklist setting (by default this only allows public IPs) and by the limited information returned to the client: 1. For discovered oEmbed URLs, any non-JSON response or a JSON response which includes non-oEmbed information is discarded. 2. For discovered image URLs, any non-image response is discarded. Systems which have URL preview disabled (via the url_preview_enabled setting) or have not configured a url_preview_url_blacklist are not affected. This issue has been addressed in version 1.85.0. Users are advised to upgrade. User unable to upgrade may also disable URL previews.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Synapse URL preview bypass of url_preview_url_blacklist via oEmbed or image URLs allows potential SSRF, fixed in version 1.85.0.

Vulnerability

Details CVE-2023-32683 is a bypass in Synapse, a Matrix homeserver, where discovered oEmbed or image URLs can circumvent the url_preview_url_blacklist configuration setting [1][2]. This could allow server-side request forgery (SSRF) or bypassing network policies, though impact is limited by the url_preview_ip_range_blacklist (default only public IPs) and the restricted information returned to the client [2].

Exploitation

An attacker can craft a message containing an oEmbed or image URL that, when previewed by the server, may bypass the blacklist and cause the server to make requests to unintended IPs [2]. However, non-JSON or non-image responses are discarded, limiting the data leakage [2]. Systems without URL preview enabled or without a configured blacklist are not affected [2].

Impact

Successful exploitation could allow an attacker to perform SSRF attacks within the allowed IP range, potentially accessing internal services or conducting reconnaissance [2]. The severity is considered low due to the constraints [4].

Mitigation

The issue has been fixed in Synapse version 1.85.0 [1][4]. Users are advised to upgrade, or alternatively disable URL previews via url_preview_enabled setting [2].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
matrix-synapsePyPI
< 1.85.01.85.0

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.