Apache Geode is vulnerable to CSRF attacks through GET requests to the Management and Monitoring REST API that could allow an attacker who has tricked a user into giving up their Geode session credentials to submit malicious commands on the target system on behalf of the authenticated user.
This issue affects Apache Geode: versions 1.10 through 1.15.1
Users are recommended to upgrade to version 1.15.2, which fixes the issue.
This issue affects Apache Geode: versions 1.10 through 1.15.1
Users are recommended to upgrade to version 1.15.2, which fixes the issue.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sat, 18 Oct 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Apache Geode is vulnerable to CSRF attacks through GET requests to the Management and Monitoring REST API that could allow an attacker who has tricked a user into giving up their Geode session credentials to submit malicious commands on the target system on behalf of the authenticated user. This issue affects Apache Geode: versions 1.10 through 1.15.1 Users are recommended to upgrade to version 1.15.2, which fixes the issue. | |
Title | Apache Geode: CSRF attacks through GET requests to the Management and Monitoring REST API that can execute gfsh commands on the target system | |
Weaknesses | CWE-352 | |
References |
|

Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-10-18T15:15:09.547Z
Reserved: 2025-05-06T13:16:19.188Z
Link: CVE-2025-47410

No data.

Status : Received
Published: 2025-10-18T16:15:35.557
Modified: 2025-10-18T16:15:35.557
Link: CVE-2025-47410

No data.

No data.