Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2025-30323 | MapServer is a system for developing web-based GIS applications. Prior to 8.4.1, the XML Filter Query directive PropertyName is vulnerably to Boolean-based SQL injection. It seems like expression checking is bypassed by introducing double quote characters in the PropertyName. Allowing to manipulate backend database queries. This vulnerability is fixed in 8.4.1. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 08 Oct 2025 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Osgeo
Osgeo mapserver |
|
CPEs | cpe:2.3:a:osgeo:mapserver:8.4.0:-:*:*:*:*:*:* | |
Vendors & Products |
Osgeo
Osgeo mapserver |
|
Metrics |
cvssV3_1
|
Mon, 22 Sep 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Mapserver
Mapserver mapserver |
|
Vendors & Products |
Mapserver
Mapserver mapserver |
Fri, 19 Sep 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 19 Sep 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | MapServer is a system for developing web-based GIS applications. Prior to 8.4.1, the XML Filter Query directive PropertyName is vulnerably to Boolean-based SQL injection. It seems like expression checking is bypassed by introducing double quote characters in the PropertyName. Allowing to manipulate backend database queries. This vulnerability is fixed in 8.4.1. | |
Title | MapServer - WFS XML Filter Query SQL injection | |
Weaknesses | CWE-89 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-09-19T19:42:16.930Z
Reserved: 2025-09-15T19:13:16.905Z
Link: CVE-2025-59431

Updated: 2025-09-19T19:41:54.939Z

Status : Analyzed
Published: 2025-09-19T20:15:40.177
Modified: 2025-10-08T18:26:15.403
Link: CVE-2025-59431

No data.

Updated: 2025-09-22T09:58:57Z