Skip to main content

CVE-2025-27505: CWE-862: Missing Authorization in geoserver geoserver

Medium
VulnerabilityCVE-2025-27505cvecve-2025-27505cwe-862
Published: Tue Jun 10 2025 (06/10/2025, 14:52:19 UTC)
Source: CVE Database V5
Vendor/Project: geoserver
Product: geoserver

Description

GeoServer is an open source server that allows users to share and edit geospatial data. It is possible to bypass the default REST API security and access the index page. The REST API security handles rest and its subpaths but not rest with an extension (e.g., rest.html). The REST API index can disclose whether certain extensions are installed. This vulnerability is fixed in 2.26.3 and 2.25.6. As a workaround, in ${GEOSERVER_DATA_DIR}/security/config.xml, change the paths for the rest filter to /rest.*,/rest/** and change the paths for the gwc filter to /gwc/rest.*,/gwc/rest/** and restart GeoServer.

AI-Powered Analysis

AILast updated: 07/11/2025, 20:47:36 UTC

Technical Analysis

CVE-2025-27505 is a medium-severity vulnerability affecting GeoServer, an open-source server platform used for sharing and editing geospatial data. The vulnerability arises from missing authorization checks in the REST API, specifically when accessing REST endpoints with extensions such as 'rest.html'. While the REST API security correctly protects the base REST paths and their subpaths, it fails to secure REST paths that include extensions. This flaw allows an unauthenticated attacker to bypass the default REST API security controls and access the REST API index page. Accessing this index page can disclose information about installed extensions, potentially aiding further targeted attacks or reconnaissance. The vulnerability affects GeoServer versions from 2.25.0 up to but not including 2.25.6, and versions 2.26.0 up to but not including 2.26.3. The issue is classified under CWE-862 (Missing Authorization). The vulnerability does not allow modification or deletion of data but leaks some information about the system configuration. The CVSS v3.1 base score is 5.3 (medium), reflecting network attack vector, low complexity, no privileges required, no user interaction, and limited confidentiality impact. The vendor has fixed the vulnerability in versions 2.25.6 and 2.26.3. As a workaround, administrators can modify the GeoServer security configuration file (config.xml) to extend the REST filter paths to include patterns like /rest.* and /rest/**, and similarly for the gwc filter, then restart GeoServer to enforce proper authorization on these extended paths.

Potential Impact

For European organizations using GeoServer to manage and serve geospatial data, this vulnerability poses a moderate risk. GeoServer is often used by government agencies, urban planners, environmental organizations, and utilities to share sensitive geospatial information. Although the vulnerability does not allow direct data modification or deletion, unauthorized access to the REST API index page can reveal information about installed extensions and potentially expose system configuration details. This information leakage can facilitate further reconnaissance and targeted attacks, increasing the risk of subsequent exploitation. In sectors where geospatial data confidentiality is critical—such as defense, critical infrastructure, and urban planning—this could lead to privacy violations or intelligence gathering by malicious actors. Since exploitation requires no authentication or user interaction and can be performed remotely, the attack surface is broad. However, the lack of direct data integrity or availability impact limits the severity. Organizations relying on vulnerable GeoServer versions should consider the potential for indirect impacts, including reputational damage and compliance issues related to data protection regulations like GDPR if sensitive information is exposed.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should promptly upgrade GeoServer to versions 2.25.6 or 2.26.3 or later, where the issue is fully resolved. If immediate upgrade is not feasible, apply the recommended workaround by editing the ${GEOSERVER_DATA_DIR}/security/config.xml file to modify the REST and GWC filter paths to include patterns such as /rest.* and /rest/**, and /gwc/rest.* and /gwc/rest/** respectively. After making these changes, restart the GeoServer service to apply the new security filters. Additionally, organizations should audit their GeoServer deployments to identify any unauthorized access attempts or unusual activity around the REST API endpoints. Implement network-level access controls to restrict access to GeoServer management interfaces to trusted IP ranges. Monitoring and logging REST API access can help detect exploitation attempts early. Finally, ensure that GeoServer instances are not unnecessarily exposed to the public internet and are protected behind firewalls or VPNs where possible.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-02-26T18:11:52.305Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f551b0bd07c3938a3ef

Added to database: 6/10/2025, 6:54:13 PM

Last enriched: 7/11/2025, 8:47:36 PM

Last updated: 8/13/2025, 11:12:23 AM

Views: 25

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats