Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | GeoServer Web Feature Service (WFS) is vulnerable to an XML External Entity (XXE) processing attack due to improper handling of XML input. This vulnerability allows attackers to perform Out-of-Band (OOB) data exfiltration and Server-Side Request Forgery (SSRF) by exploiting the GeoTools library. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-30220.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2024-34711 | 9.3 CRITICAL | GeoServer has improper ENTITY_RESOLUTION_ALLOWLIST URI validation in XML Processing (SSRF) |
| CVE-2024-29198 | 7.5 HIGH | GeoServer Vulnerable to Unauthenticated SSRF via TestWfsPost |
| CVE-2025-30145 | 7.5 HIGH | GeoServer has an Infinite Loop Vulnerability in Jiffle process |
| CVE-2024-40625 | 5.5 MEDIUM | GeoServer Coverage REST API Allows Server Side Request Forgery |
| CVE-2025-27505 | 5.3 MEDIUM | GeoServer Missing Authorization on REST API Index |
| CVE-2024-38524 | 5.3 MEDIUM | GWC Home Page communicate version and revision information |
No comments yet