Categories: Cyber Security News

CISA Warns of OSGeo GeoServer 0-Day Vulnerability Exploited in Attacks

An urgent warning about a critical security flaw in OSGeo GeoServer, a widely used open-source geographic data-sharing server.

CISA has added the vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, indicating that threat actors are actively leveraging this zero-day flaw in attacks targeting both public and private sectors.

The newly disclosed vulnerability, tracked as CVE-2025-58360, is classified as an Improper Restriction of XML External Entity (XXE) Reference.

This security gap exists within the application’s handling of XML input. Specifically involving the /geoserver/wms endpoint during GetMap operations.

Field Details
CVE ID CVE-2025-58360
Name OSGeo GeoServer XXE Vulnerability
Description XML input in /geoserver/wms GetMap is not properly restricted, allowing external XML entities.
Related CWE CWE-611
Action Apply vendor fixes, follow BOD 22-01 for cloud services, or stop using the product.

Security researchers have determined that the software fails to restrict external entities in XML requests properly.

By exploiting this weakness, remote attackers can define malicious external entities in their requests. Successful exploitation could allow unauthorized actors to view files on the server.

Interact with backend or external systems (Server-Side Request Forgery), or cause denial-of-service conditions.

The confirmation of active exploitation prompted CISA to intervene, requiring federal civilian executive branch (FCEB) agencies to immediately secure their systems.

In accordance with Binding Operational Directive (BOD) 22-01, CISA has mandated that all FCEB agencies must identify and mitigate this vulnerability by January 1, 2026.

While the mandate applies only to federal agencies, CISA strongly urges all organizations that use OSGeo GeoServer to prioritize this update.

The short remediation window reflects the severity of the threat and the active nature of current campaigns. Administrators are advised to apply the relevant vendor mitigations immediately.

If patches are not yet available for specific configurations, organizations should follow CISA’s guidance for cloud services. Consider temporarily discontinuing the use of the affected product until it can be secured.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

The post CISA Warns of OSGeo GeoServer 0-Day Vulnerability Exploited in Attacks appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Google Maps Location Picker: Get, Select & Save Lat/Lng in JS

location-picker is a lightweight JavaScript library that allows you to easily get Google Map location…

2 hours ago

Add an Floating Accessibility Panel via Web Component – Open Overlay

Open Overlay is a vanilla JavaScript Web Component that adds an accessibility settings widget to…

2 hours ago

10 Best Full Disk Encryption Tools in 2026

Full Disk Encryption (FDE) is a security feature that encrypts the entire contents of a…

2 hours ago

Top 10 Best Interactive Malware Analysis Tools in 2026

As we navigate through 2026, the cybersecurity landscape has never been more complex. Threat actors…

2 hours ago

ODINI Malware Uses CPU Magnetic Emissions to Breach Faraday-Shielded Air-Gapped Computers

ODINI is a sophisticated proof-of-concept malware capable of extracting sensitive information from air-gapped computers protected…

2 hours ago

Sail Drones Deployed on Great Lakes for First Time in 2026 Summer Patrols

CHICAGO, IL (WOWO) A new era of maritime monitoring is coming to the Great Lakes…

2 hours ago

This website uses cookies.