GeoServer is an open source server that allows users to share and edit geospatial data. Prior to version 2.25.0, a reflected cross-site scripting (XSS) vulnerability exists in the WMS GetFeatureInfo HTML output format that enables a remote attacker to execute arbitrary JavaScript code in a victim's browser through specially crafted SLD_BODY parameters. This issue has been patched in version 2.25.0.
References
| Link | Resource |
|---|---|
| https://github.com/geoserver/geoserver/commit/dc9ff1c726dd73c884437a123b4ad72b19383c7d | Patch |
| https://github.com/geoserver/geoserver/pull/7406 | Issue Tracking |
| https://github.com/geoserver/geoserver/security/advisories/GHSA-w66h-j855-qr72 | Vendor Advisory |
| https://osgeo-org.atlassian.net/browse/GEOS-11297 | Issue Tracking |
Configurations
History
No history.
Information
Published : 2025-11-25 22:15
Updated : 2025-12-03 16:43
NVD link : CVE-2025-21621
Mitre link : CVE-2025-21621
CVE.ORG link : CVE-2025-21621
JSON object : View
Products Affected
geoserver
- geoserver
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
