CVE-2025-27505
low-risk
Published 2025-06-10
GeoServer is an open source server that allows users to share and edit geospatial data. It is possible to bypass the default REST API security and access the index page. The REST API security handles rest and its subpaths but not rest with an extension (e.g., rest.html). The REST API index can disclose whether certain extensions are installed. This vulnerability is fixed in 2.26.3 and 2.25.6. As a workaround, in ${GEOSERVER_DATA_DIR}/security/config.xml, change the paths for the rest filter to /rest.*,/rest/** and change the paths for the gwc filter to /gwc/rest.*,/gwc/rest/** and restart GeoServer.
Do I need to act?
-
0.86% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.3/10
Medium
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (4)
Third Party Advisory
https://github.com/geoserver/geoserver/security/advisories/GHSA-h86g-x8mm-78m5
Issue Tracking
https://osgeo-org.atlassian.net/browse/GEOS-11664
Permissions Required
https://osgeo-org.atlassian.net/browse/GEOS-11776
29
/ 100
low-risk
Severity
21/34 · High
Exploitability
3/34 · Minimal
Exposure
5/34 · Minimal