Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | GeoServer contains a missing authorization vulnerability that allows unauthorized access to the REST API Index page, potentially exposing sensitive configuration information. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-27505.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2025-30220 | 9.9 CRITICAL | GeoTools, GeoServer, and GeoNetwork XML External Entity (XXE) Processing Vulnerability in |
| CVE-2024-34711 | 9.3 CRITICAL | GeoServer has improper ENTITY_RESOLUTION_ALLOWLIST URI validation in XML Processing (SSRF) |
| CVE-2024-29198 | 7.5 HIGH | GeoServer Vulnerable to Unauthenticated SSRF via TestWfsPost |
| CVE-2025-30145 | 7.5 HIGH | GeoServer has an Infinite Loop Vulnerability in Jiffle process |
| CVE-2024-40625 | 5.5 MEDIUM | GeoServer Coverage REST API Allows Server Side Request Forgery |
| CVE-2024-38524 | 5.3 MEDIUM | GWC Home Page communicate version and revision information |
No comments yet