Description
Apache Batik 1.13 is vulnerable to server-side request forgery, caused by improper input validation by the NodePickerPanel. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3619-1 | batik security update |
Debian DLA |
DLA-4243-1 | batik security update |
Github GHSA |
GHSA-2h63-qp69-fwvw | Server-side request forgery (SSRF) in Apache Batik |
Ubuntu USN |
USN-6117-1 | Apache Batik vulnerabilities |
References
History
Mon, 03 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Subscriptions
Apache
Subscribe
Batik
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Fedoraproject
Subscribe
Fedora
Subscribe
Oracle
Subscribe
Agile Engineering Data Management
Subscribe
Banking Apis
Subscribe
Banking Digital Experience
Subscribe
Communications Application Session Controller
Subscribe
Communications Metasolv Solution
Subscribe
Communications Offline Mediation Controller
Subscribe
Enterprise Repository
Subscribe
Flexcube Universal Banking
Subscribe
Fusion Middleware Mapviewer
Subscribe
Instantis Enterprisetrack
Subscribe
Insurance Policy Administration
Subscribe
Product Lifecycle Analytics
Subscribe
Retail Back Office
Subscribe
Retail Central Office
Subscribe
Retail Order Broker
Subscribe
Retail Order Management System Cloud Service
Subscribe
Retail Point-of-service
Subscribe
Retail Returns Management
Subscribe
Weblogic Server
Subscribe
Redhat
Subscribe
Jboss Fuse
Subscribe
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-11-03T19:25:28.147Z
Reserved: 2020-04-21T00:00:00.000Z
Link: CVE-2020-11987
No data.
Status : Modified
Published: 2021-02-24T18:15:11.093
Modified: 2025-11-03T20:15:42.737
Link: CVE-2020-11987
OpenCVE Enrichment
No data.
Debian DLA
Github GHSA
Ubuntu USN