Home

Description

MapServer is a system for developing web-based GIS applications. From version 6.0 to before version 8.6.2, a reflected XSS vulnerability in MapServer's WMS server allows an unauthenticated attacker to inject arbitrary HTML/JavaScript into the browser of any user who opens a crafted WMS URL. The vulnerability is triggered via FORMAT=application/openlayers combined with an unsanitized SRS parameter in WMS 1.3.0 requests. This issue has been patched in version 8.6.2.

PUBLISHED Reserved 2026-04-23 | Published 2026-05-08 | Updated 2026-05-08 | Assigner GitHub_M




MEDIUM: 6.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Problem types

CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)

Product status

>= 6.0, < 8.6.2
affected

References

github.com/...Server/security/advisories/GHSA-4g9f-ph64-hg2x

github.com/MapServer/MapServer/releases/tag/rel-8-6-2

cve.org (CVE-2026-42030)

nvd.nist.gov (CVE-2026-42030)

Download JSON