GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. A stored cross-site scripting (XSS) vulnerability exists in versions prior to 2.23.4 and 2.24.1 that enables an authenticated administrator with workspace-level privileges to store a JavaScript payload in the GeoServer catalog that will execute in the context of another user's browser when viewed in the GWC Demos Page. Access to the GWC Demos Page is available to all users although data security may limit users' ability to trigger the XSS. Versions 2.23.4 and 2.24.1 contain a patch for this issue.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2024-0872 | GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. A stored cross-site scripting (XSS) vulnerability exists in versions prior to 2.23.4 and 2.24.1 that enables an authenticated administrator with workspace-level privileges to store a JavaScript payload in the GeoServer catalog that will execute in the context of another user's browser when viewed in the GWC Demos Page. Access to the GWC Demos Page is available to all users although data security may limit users' ability to trigger the XSS. Versions 2.23.4 and 2.24.1 contain a patch for this issue. |
![]() |
GHSA-88wc-fcj9-q3r9 | GeoServer's GWC Demos Page vulnerable to Stored Cross-Site Scripting (XSS) |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 10 Apr 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 17 Dec 2024 20:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Geoserver
Geoserver geoserver |
|
CPEs | cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:* cpe:2.3:a:geoserver:geoserver:2.24.0:-:*:*:*:*:*:* |
|
Vendors & Products |
Geoserver
Geoserver geoserver |

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-10T20:17:43.665Z
Reserved: 2024-01-22T22:23:54.337Z
Link: CVE-2024-23821

Updated: 2024-08-01T23:13:08.591Z

Status : Analyzed
Published: 2024-03-20T18:15:10.407
Modified: 2024-12-17T20:21:38.387
Link: CVE-2024-23821

No data.

No data.