Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-w66h-j855-qr72: GeoServer has a Reflected Cross-Site Scripting (XSS) vulnerability in its WMS GetFeatureInfo HTML format

Summary

A reflected cross-site scripting (XSS) vulnerability exists in the WMS GetFeatureInfo HTML output format that enables a remote attacker to execute arbitrary JavaScript code in a victim’s browser through specially crafted SLD_BODY parameters.

Details

The WMS service setting that controls HTML auto-escaping is either disabled by default, or completely missing, in the affected versions (see workarounds).

Impact

If an attacker can control a script that is executed in the victim’s browser, then they can typically fully compromise that user. Amongst other things, the attacker can:

  1. Perform any action within the application that the user can perform.
  2. View any information that the user is able to view.
  3. Modify any information that the user is able to modify.
  4. Initiate interactions with other application users, including malicious attacks, that will appear to originate from the initial victim user.

Workarounds

Changing any of the following WMS service settings should mitigate this vulnerability in most environments:

  1. Enable GetFeatureInfo HTML auto-escaping (available in GeoServer 2.21.3+ and 2.22.1+)
  2. Disable dynamic styling
  3. Disable GetFeatureInfo text/html MIME type

References

https://osgeo-org.atlassian.net/browse/GEOS-11297 https://github.com/geoserver/geoserver/pull/7406

ghsa
#xss#vulnerability#web#git#java#maven
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2025-21621

GeoServer has a Reflected Cross-Site Scripting (XSS) vulnerability in its WMS GetFeatureInfo HTML format

Moderate severity GitHub Reviewed Published Nov 25, 2025 in geoserver/geoserver • Updated Nov 25, 2025

Package

maven org.geoserver.web:gs-web-app (Maven)

Affected versions

< 2.25.0

maven org.geoserver:gs-wms (Maven)

Summary

A reflected cross-site scripting (XSS) vulnerability exists in the WMS GetFeatureInfo HTML output format that enables a remote attacker to execute arbitrary JavaScript code in a victim’s browser through specially crafted SLD_BODY parameters.

Details

The WMS service setting that controls HTML auto-escaping is either disabled by default, or completely missing, in the affected versions (see workarounds).

Impact

If an attacker can control a script that is executed in the victim’s browser, then they can typically fully compromise that user. Amongst other things, the attacker can:

  1. Perform any action within the application that the user can perform.
  2. View any information that the user is able to view.
  3. Modify any information that the user is able to modify.
  4. Initiate interactions with other application users, including malicious attacks, that will appear to originate from the initial victim user.

Workarounds

Changing any of the following WMS service settings should mitigate this vulnerability in most environments:

  1. Enable GetFeatureInfo HTML auto-escaping (available in GeoServer 2.21.3+ and 2.22.1+)
  2. Disable dynamic styling
  3. Disable GetFeatureInfo text/html MIME type

References

https://osgeo-org.atlassian.net/browse/GEOS-11297
geoserver/geoserver#7406

References

  • GHSA-w66h-j855-qr72
  • geoserver/geoserver#7406
  • https://osgeo-org.atlassian.net/browse/GEOS-11203
  • https://osgeo-org.atlassian.net/browse/GEOS-11297

Published to the GitHub Advisory Database

Nov 25, 2025

Last updated

Nov 25, 2025

ghsa: Latest News

GHSA-x6vr-q3vf-vqgq: REDAXO CMS is vulnerable to Reflected XSS in Mediapool Info Banner via args[types]