GeoServer XML External Entity (XXE) Vulnerability

HIGH (8.2) Workaround Available

Threat Intelligence

High Risk - Exploits exist
EPSS Score: 71.92% chance of exploitation (percentile: 99%)
🔍 Detection Tools: OSV.dev, Nuclei
⚔️ Exploit Availability: GitHub PoC, CISA KEV

How we test →

What is it?

GeoServer is an open-source geospatial data server that allows users to share and edit geospatial data. The vulnerability exists due to insufficient XML input sanitization in the WMS GetMap operation, allowing attackers to define external entities within the XML request.

Am I affected?

You're affected if you use GeoServer. Affected versions: 2.25.6, 2.26.2 If you don't recognise this software, you're probably not affected.

Affected Packages

maven: org.geoserver.web:gs-web-app

Affected Products

Open Source Geospatial Foundation (OSGeo) / GeoServer

How to fix

Update to GeoServer 2.25.6, 2.26.3, or 2.27.0.
* Maven: maven org.geoserver:gs-web-app >= 2.25.6 (or update the dependency version)
* Docker: docker run -it --rm osgeo/geoserver:2.25.6
- Immediate mitigations:
+ Restrict network access to your GeoServer instance (firewall it from the public internet)
+ Audit admin account activity for suspicious access patterns
+ Monitor for unauthorized token creation