Headline
GHSA-w595-4975-gm3h: Apache Geode web-api is vulnerable to Cross-site Scripting
Malicious script injection (‘Cross-site Scripting’) vulnerability in Apache Geode web-api (REST). This vulnerability allows an attacker that tricks a logged-in user into clicking a specially-crafted link to execute code on the returned page, which could lead to theft of the user’s session information and even account takeover.
This issue affects Apache Geode: all versions prior to 1.15.2.
Users are recommended to upgrade to version 1.15.2, which fixes the issue.
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2024-44088
Apache Geode web-api is vulnerable to Cross-site Scripting
Moderate severity GitHub Reviewed Published Oct 14, 2025 to the GitHub Advisory Database • Updated Oct 14, 2025
Package
maven org.apache.geode:geode-web-api (Maven)
Affected versions
>= 1.1.0, < 1.15.2
Malicious script injection (‘Cross-site Scripting’) vulnerability in Apache Geode web-api (REST). This vulnerability allows an attacker that tricks a logged-in user into clicking a specially-crafted link to execute code on the returned page, which could lead to theft of the user’s session information and even account takeover.
This issue affects Apache Geode: all versions prior to 1.15.2.
Users are recommended to upgrade to version 1.15.2, which fixes the issue.
References
- https://nvd.nist.gov/vuln/detail/CVE-2024-44088
- https://lists.apache.org/thread/161r34nokmcc0w74mnf04lskgb8g1d3g
Published to the GitHub Advisory Database
Oct 14, 2025
Last updated
Oct 14, 2025