Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | GeoServer 2.26.0 to 2.26.2 and 2.25.6 contains an XML External Entity (XXE) injection caused by insufficient sanitization of XML input in /geoserver/wms GetMap operation, letting attackers disclose files or cause DoS, exploit requires crafted XML input. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-58360.yaml | POC Details |
| 2 | CVE-2025-58360 | https://github.com/B1ack4sh/Blackash-CVE-2025-58360 | POC Details |
| 3 | XXE through a specific endpoint /geoserver/wms operation GetMap - Geoserver | https://github.com/quyenheu/CVE-2025-58360 | POC Details |
| 4 | CVE-2025-58360 | https://github.com/Ashwesker/Blackash-CVE-2025-58360 | POC Details |
| 5 | Passive detection for CVE-2025-58360 | https://github.com/rxerium/CVE-2025-58360 | POC Details |
| 6 | None | https://github.com/Joker-Wiggin/CVE-2025-58360-GeoServer-XXE | POC Details |
| 7 | CVE-2025-58360 | https://github.com/Ashwesker/Ashwesker-CVE-2025-58360 | POC Details |
| 8 | A new way to exploit CVE-2025-58360 bypass WAF | https://github.com/quyenheu/Bypass-CVE-2025-58360 | POC Details |
| 9 | CVE-2025-58360 | https://github.com/carlzhang123/Blackash-CVE-2025-58360 | POC Details |
| 10 | None | https://github.com/thomas-osgood/cve-2025-58360 | POC Details |
No public POC found.
Login to generate AI POCZaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.