Home

Description

GeoServer is an open source server that allows users to share and edit geospatial data. From version 2.26.0 to before 2.26.2 and before 2.25.6, an XML External Entity (XXE) vulnerability was identified. The application accepts XML input through a specific endpoint /geoserver/wms operation GetMap. However, this input is not sufficiently sanitized or restricted, allowing an attacker to define external entities within the XML request. This issue has been patched in GeoServer 2.25.6, GeoServer 2.26.3, and GeoServer 2.27.0.

PUBLISHED Reserved 2025-08-29 | Published 2025-11-25 | Updated 2025-12-12 | Assigner GitHub_M




HIGH: 8.2CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L

CISA Known Exploited Vulnerability

Date added 2025-12-11 | Due date 2026-01-01

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Problem types

CWE-611: Improper Restriction of XML External Entity Reference

Product status

>= 2.26.0, < 2.26.2
affected

< 2.25.6
affected

References

www.cisa.gov/...erabilities-catalog?field_cve=CVE-2025-58360 government-resource

github.com/...server/security/advisories/GHSA-fjf5-xgmq-5525

osgeo-org.atlassian.net/browse/GEOS-11682

cve.org (CVE-2025-58360)

nvd.nist.gov (CVE-2025-58360)

Download JSON