PT-2025-48086 · Geoserver · Geoserver
Published
2025-11-25
·
Updated
2026-02-01
·
CVE-2025-58360
CVSS v3.1
9.8
9.8
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
GeoServer versions 2.26.0 through 2.26.1 and versions prior to 2.25.6
Description
GeoServer is an open-source server used for sharing and editing geospatial data. A vulnerability exists due to improper restriction of XML external entity references in the WMS GetMap operation. This allows attackers to define external entities within XML requests, potentially leading to unauthorized access to files, Server-Side Request Forgery (SSRF), and denial-of-service conditions. The vulnerability is actively exploited and affects systems with the /geoserver/wms endpoint exposed. Approximately 20,000+ public network exposed assets are affected. The vulnerability allows an attacker to read arbitrary files from the server and potentially enable denial-of-service conditions or internal system access. The vulnerability is exploitable without authentication.
Recommendations
Update to GeoServer version 2.25.6, 2.26.3, or 2.27.0.
Fix
XXE
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-14710
CVE-2025-58360
GHSA-FJF5-XGMQ-5525
Affected Products
Geoserver
References · 70
- https://github.com/geoserver/geoserver/security/advisories/GHSA-fjf5-xgmq-5525⭐ 4196 🔗 2261 · Vendor Advisory
- https://osv.dev/vulnerability/GHSA-fjf5-xgmq-5525 · Vendor Advisory
- https://osv.dev/vulnerability/CVE-2025-58360 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-14710 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-58360 · Security Note
- https://github.com/geoserver/geoserver⭐ 4196 🔗 2261 · Note
- https://twitter.com/piedpiper1616/status/1994013771413565693 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1pliuy5/top_10_trending_cves_13122025 · Reddit Post
- https://reddit.com/r/pwnhub/comments/1pkoy63/cisa_urges_immediate_action_on_critical_geoserver · Reddit Post
- https://t.me/cveNotify/144528 · Telegram Post
- https://t.me/defcon_news/132889 · Telegram Post
- https://twitter.com/transilienceai/status/2002257978003464604 · Twitter Post
- https://twitter.com/bbwriteups/status/2016241478826385415 · Twitter Post
- https://reddit.com/gallery/1pbct67 · Reddit Post
- https://twitter.com/zoomeye_team/status/1993622182984061002 · Twitter Post