Skip to content

Commit 995df84

Browse files
1 parent f61420e commit 995df84

File tree

1 file changed

+88
-0
lines changed

1 file changed

+88
-0
lines changed
Lines changed: 88 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,88 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-w66h-j855-qr72",
4+
"modified": "2025-11-25T18:41:54Z",
5+
"published": "2025-11-25T18:41:53Z",
6+
"aliases": [
7+
"CVE-2025-21621"
8+
],
9+
"summary": "GeoServer has a Reflected Cross-Site Scripting (XSS) vulnerability in its WMS GetFeatureInfo HTML format",
10+
"details": "### Summary\nA reflected cross-site scripting (XSS) vulnerability exists in the WMS GetFeatureInfo HTML output format that enables a remote attacker to execute arbitrary JavaScript code in a victim's browser through specially crafted SLD_BODY parameters. \n\n### Details\n\nThe WMS service setting that controls HTML auto-escaping is either disabled by default, or completely missing, in the affected versions (see workarounds).\n\n### Impact\n\nIf an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user. Amongst other things, the attacker can:\n1. Perform any action within the application that the user can perform.\n2. View any information that the user is able to view.\n3. Modify any information that the user is able to modify.\n4. Initiate interactions with other application users, including malicious attacks, that will appear to originate from the initial victim user.\n\n### Workarounds\nChanging any of the following WMS service settings should mitigate this vulnerability in most environments:\n1. Enable GetFeatureInfo HTML auto-escaping (available in GeoServer 2.21.3+ and 2.22.1+)\n2. Disable dynamic styling\n3. Disable GetFeatureInfo text/html MIME type\n\n### References\nhttps://osgeo-org.atlassian.net/browse/GEOS-11297\nhttps://github.com/geoserver/geoserver/pull/7406",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Maven",
21+
"name": "org.geoserver.web:gs-web-app"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "2.25.0"
32+
}
33+
]
34+
}
35+
]
36+
},
37+
{
38+
"package": {
39+
"ecosystem": "Maven",
40+
"name": "org.geoserver:gs-wms"
41+
},
42+
"ranges": [
43+
{
44+
"type": "ECOSYSTEM",
45+
"events": [
46+
{
47+
"introduced": "0"
48+
},
49+
{
50+
"fixed": "2.25.0"
51+
}
52+
]
53+
}
54+
]
55+
}
56+
],
57+
"references": [
58+
{
59+
"type": "WEB",
60+
"url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-w66h-j855-qr72"
61+
},
62+
{
63+
"type": "WEB",
64+
"url": "https://github.com/geoserver/geoserver/pull/7406"
65+
},
66+
{
67+
"type": "PACKAGE",
68+
"url": "https://github.com/geoserver/geoserver"
69+
},
70+
{
71+
"type": "WEB",
72+
"url": "https://osgeo-org.atlassian.net/browse/GEOS-11203"
73+
},
74+
{
75+
"type": "WEB",
76+
"url": "https://osgeo-org.atlassian.net/browse/GEOS-11297"
77+
}
78+
],
79+
"database_specific": {
80+
"cwe_ids": [
81+
"CWE-79"
82+
],
83+
"severity": "MODERATE",
84+
"github_reviewed": true,
85+
"github_reviewed_at": "2025-11-25T18:41:53Z",
86+
"nvd_published_at": null
87+
}
88+
}

0 commit comments

Comments
 (0)