XML External Entity Flaw in GeoServer by OSGeo
CVE-2025-58360

8.2HIGH

Key Information:

Vendor

Geoserver

Status
Vendor
CVE Published:
25 November 2025

Badges

πŸ”₯ Trending nowπŸ“ˆ TrendedπŸ“ˆ Score: 1,800πŸ‘Ύ Exploit Exists🟑 Public PoC

What is CVE-2025-58360?

CVE-2025-58360 is a vulnerability affecting GeoServer, an open-source server designed for sharing and editing geospatial data. The issue arises from an XML External Entity (XXE) flaw that impacts versions of GeoServer ranging from 2.26.0 to before 2.26.2 and 2.25.6. This vulnerability allows attackers to send specially crafted XML input to the server's /geoserver/wms operation GetMap endpoint. Due to insufficient sanitization of this input, an attacker could exploit the vulnerability by including external entities in the XML request, potentially leading to unauthorized data access or other malicious outcomes. GeoServer has addressed this vulnerability in later versions, specifically 2.25.6, 2.26.3, and 2.27.0.

Potential Impact of CVE-2025-58360

  1. Data Leakage: The primary risk associated with CVE-2025-58360 is the potential for unauthorized access to sensitive geospatial data. Exploiting the XXE vulnerability could allow attackers to retrieve arbitrary files from the server, leading to information disclosure.

  2. Denial of Service: Through specially crafted XML payloads, an attacker could trigger denial of service scenarios by overloading the server or causing it to crash, thereby disrupting services that depend on GeoServer for geospatial data access.

  3. Increased Attack Surface: The presence of this vulnerability may create opportunities for further exploitation of the system, as attackers could use initial access gained via the XXE flaw to explore and compromise additional services or databases linked to the GeoServer instance.

Affected Version(s)

geoserver >= 2.26.0, < 2.26.2 < 2.26.0, 2.26.2

geoserver < 2.25.6 < 2.25.6

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
8.2
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • πŸ“ˆ

    Vulnerability started trending

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-58360 : XML External Entity Flaw in GeoServer by OSGeo