Skip to main content

CVE-2024-40625: CWE-918: Server-Side Request Forgery (SSRF) in geoserver geoserver

Medium
VulnerabilityCVE-2024-40625cvecve-2024-40625cwe-918
Published: Tue Jun 10 2025 (06/10/2025, 14:49:05 UTC)
Source: CVE Database V5
Vendor/Project: geoserver
Product: geoserver

Description

GeoServer is an open source server that allows users to share and edit geospatial data. The Coverage rest api /workspaces/{workspaceName}/coveragestores/{storeName}/{method}.{format} allows attackers to upload files with a specified url (with {method} equals 'url') with no restrict. This vulnerability is fixed in 2.26.0.

AI-Powered Analysis

AILast updated: 07/11/2025, 20:47:14 UTC

Technical Analysis

CVE-2024-40625 is a Server-Side Request Forgery (SSRF) vulnerability identified in GeoServer, an open-source server platform used for sharing and editing geospatial data. The vulnerability exists in the Coverage REST API endpoint /workspaces/{workspaceName}/coveragestores/{storeName}/{method}.{format}, specifically when the {method} parameter is set to 'url'. This endpoint allows users to upload files by specifying a URL, but prior to version 2.26.0, there were no restrictions on the URLs that could be provided. This lack of validation enables an attacker to craft requests that cause the GeoServer to make arbitrary HTTP requests to internal or external systems, potentially bypassing network controls and accessing sensitive internal resources. The vulnerability is classified under CWE-918, which pertains to SSRF issues where an attacker can induce the server to make requests to unintended locations. The CVSS v3.1 base score is 5.5 (medium severity), with vector AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L, indicating that the attack can be performed remotely over the network with low attack complexity but requires high privileges (PR:H) on the system. The impact primarily affects confidentiality, as attackers can leverage SSRF to access sensitive internal services or data, but does not affect integrity or availability significantly. No user interaction is required, and no known exploits are currently reported in the wild. The vulnerability has been fixed in GeoServer version 2.26.0.

Potential Impact

For European organizations utilizing GeoServer versions prior to 2.26.0, this vulnerability poses a significant risk to the confidentiality of internal network resources. Since GeoServer is commonly used by governmental agencies, environmental organizations, and private sector companies dealing with geospatial data, exploitation could lead to unauthorized access to sensitive internal services, such as internal APIs, databases, or cloud metadata services. This could result in data leakage or reconnaissance that facilitates further attacks. The requirement for high privileges to exploit limits the risk to some extent, but insider threats or compromised accounts could still leverage this vulnerability. Additionally, SSRF can be used as a pivot point to bypass network segmentation, which is critical in environments with strict data protection regulations such as GDPR. The limited impact on integrity and availability reduces the risk of direct service disruption, but confidentiality breaches could have regulatory and reputational consequences for European entities.

Mitigation Recommendations

European organizations should prioritize upgrading GeoServer to version 2.26.0 or later, where this SSRF vulnerability is patched. Until the upgrade is possible, organizations should implement strict network segmentation and firewall rules to restrict outbound HTTP requests from GeoServer servers, limiting them to only trusted destinations. Monitoring and logging of outbound requests from GeoServer should be enhanced to detect anomalous or unexpected URL requests. Access controls should be reviewed to ensure that only trusted administrators have high privilege accounts capable of exploiting this vulnerability. Additionally, implementing Web Application Firewalls (WAFs) with rules to detect and block SSRF patterns targeting the Coverage REST API endpoints can provide an additional layer of defense. Regular vulnerability scanning and penetration testing focusing on SSRF vectors in GeoServer deployments are recommended to identify and remediate any exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2024-07-08T16:13:15.510Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f551b0bd07c3938a3f5

Added to database: 6/10/2025, 6:54:13 PM

Last enriched: 7/11/2025, 8:47:14 PM

Last updated: 8/16/2025, 10:30:35 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats