CISA Flags High-Severity Vulnerability in OSGeo GeoServer Software

CISA Adds High-Severity Unauthenticated XXE Vulnerability in OSGeo GeoServer to Known Exploited Vulnerabilities Catalog Amid Active Exploitation and Mandated Federal Patching by January 2026

  • CISA has added a high-severity vulnerability affecting OSGeo GeoServer to its Known Exploited Vulnerabilities catalog due to active exploitation.
  • The flaw, CVE-2025-58360, is an unauthenticated XML External Entity (XXE) vulnerability impacting multiple GeoServer versions.
  • The issue allows attackers to access server files, conduct internal network interactions, or cause denial-of-service attacks.
  • Patched versions of GeoServer have been released, and federal agencies must apply fixes by January 1, 2026.
  • An exploit is confirmed to exist in the wild, with another critical GeoServer flaw previously exploited by threat actors.

On December 11, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) included a significant security vulnerability in OSGeo GeoServer in its Known Exploited Vulnerabilities catalog. This decision followed evidence showing the flaw is actively exploited in real-world attacks.

- Advertisement -

The vulnerability, identified as CVE-2025-58360 with a CVSS score of 8.2, is an unauthenticated XML External Entity (XXE) issue. XXE flaws allow attackers to manipulate XML input to access unauthorized data or services. It affects all versions prior to and including 2.25.5 and 2.26.0 through 2.26.1. The flaw has been resolved in GeoServer versions 2.25.6, 2.26.2, 2.27.0, 2.28.0, and 2.28.1.

According to CISA, the vulnerability arises when the application processes XML requests via the /geoserver/wms GetMap operation. Attackers can define external entities in these XML inputs, which bypasses proper restrictions. This can lead to reading arbitrary files on the server, performing Server-Side Request Forgery (SSRF) to interact with internal systems, or causing denial-of-service (DoS) conditions by consuming resources.

Affected GeoServer packages include docker.osgeo.org/geoserver and Maven packages org.geoserver.web:gs-web-app and org.geoserver:gs-wms. The vulnerability was initially reported by the AI-powered platform XBOW.

A security advisory from the Canadian Centre for Cyber Security on November 28, 2025, stated that an exploit for this vulnerability exists in the wild. While specific attack methods are not detailed, the advisory underscores the urgency of patching affected systems.

- Advertisement -

Adding to concerns, another critical GeoServer vulnerability (CVE-2024-36401) with a CVSS score of 9.8 has been actively exploited by various threat actors over the past year. Federal Civilian Executive Branch agencies are directed to implement required patches by January 1, 2026, to protect their networks.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Nvidia’s OpenAI Investment Could Be Its Last Before IPO

NVIDIA CEO Jensen Huang indicated the company's recent $30 billion investment in OpenAI may...

Bitcoin Outperforms Oil, Gold in US-Iran War Shock

Bitcoin has surged 12.1% since the onset of the US-Israeli conflict with Iran, outperforming...

Tradeweb Leads $31M Crypto Platform Crossover Series B

Tradeweb is leading a $31 million Series B in Crossover Markets, valuing the crypto...

Crypto Stocks Surge After Trump Backs Bitcoin Bill

Coinbase stock surged over 15% after former President Donald Trump expressed support for a...

Kraken Gets Fed Master Account, Banks Cry Foul

Kraken secured a Federal Reserve master account on Wednesday, becoming the first crypto bank...

Must Read

18 Countries With No Privacy Laws According To UN (List)

Privacy laws are legal frameworks designed to protect personal data from unauthorized access, misuse, or disclosure.Lack of privacy laws can lead to misuse of...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!