CVE-2024-40625: CWE-918: Server-Side Request Forgery (SSRF) in geoserver geoserver
GeoServer is an open source server that allows users to share and edit geospatial data. The Coverage rest api /workspaces/{workspaceName}/coveragestores/{storeName}/{method}.{format} allows attackers to upload files with a specified url (with {method} equals 'url') with no restrict. This vulnerability is fixed in 2.26.0.
AI Analysis
Technical Summary
CVE-2024-40625 is a Server-Side Request Forgery (SSRF) vulnerability identified in GeoServer, an open-source server platform used for sharing and editing geospatial data. The vulnerability exists in the Coverage REST API endpoint /workspaces/{workspaceName}/coveragestores/{storeName}/{method}.{format}, specifically when the {method} parameter is set to 'url'. This endpoint allows users to upload files by specifying a URL, but prior to version 2.26.0, there were no restrictions on the URLs that could be provided. This lack of validation enables an attacker to craft requests that cause the GeoServer to make arbitrary HTTP requests to internal or external systems, potentially bypassing network controls and accessing sensitive internal resources. The vulnerability is classified under CWE-918, which pertains to SSRF issues where an attacker can induce the server to make requests to unintended locations. The CVSS v3.1 base score is 5.5 (medium severity), with vector AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L, indicating that the attack can be performed remotely over the network with low attack complexity but requires high privileges (PR:H) on the system. The impact primarily affects confidentiality, as attackers can leverage SSRF to access sensitive internal services or data, but does not affect integrity or availability significantly. No user interaction is required, and no known exploits are currently reported in the wild. The vulnerability has been fixed in GeoServer version 2.26.0.
Potential Impact
For European organizations utilizing GeoServer versions prior to 2.26.0, this vulnerability poses a significant risk to the confidentiality of internal network resources. Since GeoServer is commonly used by governmental agencies, environmental organizations, and private sector companies dealing with geospatial data, exploitation could lead to unauthorized access to sensitive internal services, such as internal APIs, databases, or cloud metadata services. This could result in data leakage or reconnaissance that facilitates further attacks. The requirement for high privileges to exploit limits the risk to some extent, but insider threats or compromised accounts could still leverage this vulnerability. Additionally, SSRF can be used as a pivot point to bypass network segmentation, which is critical in environments with strict data protection regulations such as GDPR. The limited impact on integrity and availability reduces the risk of direct service disruption, but confidentiality breaches could have regulatory and reputational consequences for European entities.
Mitigation Recommendations
European organizations should prioritize upgrading GeoServer to version 2.26.0 or later, where this SSRF vulnerability is patched. Until the upgrade is possible, organizations should implement strict network segmentation and firewall rules to restrict outbound HTTP requests from GeoServer servers, limiting them to only trusted destinations. Monitoring and logging of outbound requests from GeoServer should be enhanced to detect anomalous or unexpected URL requests. Access controls should be reviewed to ensure that only trusted administrators have high privilege accounts capable of exploiting this vulnerability. Additionally, implementing Web Application Firewalls (WAFs) with rules to detect and block SSRF patterns targeting the Coverage REST API endpoints can provide an additional layer of defense. Regular vulnerability scanning and penetration testing focusing on SSRF vectors in GeoServer deployments are recommended to identify and remediate any exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Finland
CVE-2024-40625: CWE-918: Server-Side Request Forgery (SSRF) in geoserver geoserver
Description
GeoServer is an open source server that allows users to share and edit geospatial data. The Coverage rest api /workspaces/{workspaceName}/coveragestores/{storeName}/{method}.{format} allows attackers to upload files with a specified url (with {method} equals 'url') with no restrict. This vulnerability is fixed in 2.26.0.
AI-Powered Analysis
Technical Analysis
CVE-2024-40625 is a Server-Side Request Forgery (SSRF) vulnerability identified in GeoServer, an open-source server platform used for sharing and editing geospatial data. The vulnerability exists in the Coverage REST API endpoint /workspaces/{workspaceName}/coveragestores/{storeName}/{method}.{format}, specifically when the {method} parameter is set to 'url'. This endpoint allows users to upload files by specifying a URL, but prior to version 2.26.0, there were no restrictions on the URLs that could be provided. This lack of validation enables an attacker to craft requests that cause the GeoServer to make arbitrary HTTP requests to internal or external systems, potentially bypassing network controls and accessing sensitive internal resources. The vulnerability is classified under CWE-918, which pertains to SSRF issues where an attacker can induce the server to make requests to unintended locations. The CVSS v3.1 base score is 5.5 (medium severity), with vector AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L, indicating that the attack can be performed remotely over the network with low attack complexity but requires high privileges (PR:H) on the system. The impact primarily affects confidentiality, as attackers can leverage SSRF to access sensitive internal services or data, but does not affect integrity or availability significantly. No user interaction is required, and no known exploits are currently reported in the wild. The vulnerability has been fixed in GeoServer version 2.26.0.
Potential Impact
For European organizations utilizing GeoServer versions prior to 2.26.0, this vulnerability poses a significant risk to the confidentiality of internal network resources. Since GeoServer is commonly used by governmental agencies, environmental organizations, and private sector companies dealing with geospatial data, exploitation could lead to unauthorized access to sensitive internal services, such as internal APIs, databases, or cloud metadata services. This could result in data leakage or reconnaissance that facilitates further attacks. The requirement for high privileges to exploit limits the risk to some extent, but insider threats or compromised accounts could still leverage this vulnerability. Additionally, SSRF can be used as a pivot point to bypass network segmentation, which is critical in environments with strict data protection regulations such as GDPR. The limited impact on integrity and availability reduces the risk of direct service disruption, but confidentiality breaches could have regulatory and reputational consequences for European entities.
Mitigation Recommendations
European organizations should prioritize upgrading GeoServer to version 2.26.0 or later, where this SSRF vulnerability is patched. Until the upgrade is possible, organizations should implement strict network segmentation and firewall rules to restrict outbound HTTP requests from GeoServer servers, limiting them to only trusted destinations. Monitoring and logging of outbound requests from GeoServer should be enhanced to detect anomalous or unexpected URL requests. Access controls should be reviewed to ensure that only trusted administrators have high privilege accounts capable of exploiting this vulnerability. Additionally, implementing Web Application Firewalls (WAFs) with rules to detect and block SSRF patterns targeting the Coverage REST API endpoints can provide an additional layer of defense. Regular vulnerability scanning and penetration testing focusing on SSRF vectors in GeoServer deployments are recommended to identify and remediate any exploitation attempts.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2024-07-08T16:13:15.510Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68487f551b0bd07c3938a3f5
Added to database: 6/10/2025, 6:54:13 PM
Last enriched: 7/11/2025, 8:47:14 PM
Last updated: 1/7/2026, 4:18:04 AM
Views: 48
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.