Synapse unauthenticated writes to the media repository allow planting of problematic content
Description
Synapse is an open-source Matrix homeserver. Synapse before version 1.106 allows, by design, unauthenticated remote participants to trigger a download and caching of remote media from a remote homeserver to the local media repository. Such content then also becomes available for download from the local homeserver in an unauthenticated way. The implication is that unauthenticated remote adversaries can use this functionality to plant problematic content into the media repository. Synapse 1.106 introduces a partial mitigation in the form of new endpoints which require authentication for media downloads. The unauthenticated endpoints will be frozen in a future release, closing the attack vector.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Synapse before 1.106 allows unauthenticated remote users to trigger media downloads and caching, enabling planting of problematic content.
Vulnerability
Description
CVE-2024-37303 affects Synapse, an open-source Matrix homeserver. By design, versions before 1.106 permit unauthenticated remote participants to trigger the download and caching of remote media from a remote homeserver to the local media repository. This means any unauthenticated user on the federated network can cause the server to fetch and store arbitrary media files.[1][4]
Exploitation
The attack surface is broad: no authentication is required, and the attacker only needs to be a remote participant on the Matrix federation. They can craft requests that force the local homeserver to download and cache media from a remote server under their control. The downloaded content then becomes available for download from the local homeserver without any authentication.[1][4]
Impact
An unauthenticated remote adversary can use this functionality to plant problematic or illegal content into the media repository of the targeted homeserver. Once cached, this content can be served to any user (including unauthenticated ones) who requests it, potentially leading to reputational damage, legal liability, or further abuse.[1][4]
Mitigation
Synapse 1.106 introduces a partial mitigation by adding new endpoints that require authentication for media downloads. The unauthenticated endpoints will be frozen in a future release, completely closing the attack vector. In the meantime, server operators can apply stricter rate limits based on IP address as a limited workaround.[1][4] The change is aligned with Matrix Spec Proposal MSC3916, which aims to add authentication to media endpoints.[3]
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
matrix-synapsePyPI | < 1.106 | 1.106 |
Affected products
3- Range: <1.106
- element-hq/synapsev5Range: < 1.106
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-gjgr-7834-rhxrghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-37303ghsaADVISORY
- github.com/element-hq/synapse/security/advisories/GHSA-gjgr-7834-rhxrghsax_refsource_CONFIRMWEB
- github.com/matrix-org/matrix-spec-proposals/pull/3916ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.