Description
MapServer is a system for developing web-based GIS applications. Starting in version 4.2 and prior to version 8.6.1, a heap-buffer-overflow write in MapServer’s SLD (Styled Layer Descriptor) parser lets a remote, unauthenticated attacker crash the MapServer process by sending a crafted SLD with more than 100 Threshold elements inside a ColorMap/Categorize structure (commonly reachable via WMS GetMap with SLD_BODY). Version 8.6.1 patches the issue.
Published: 2026-03-27
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

MapServer parses styled layer descriptors (SLD) using a Categorize function that allows a client to specify a Threshold for each color in a ColorMap. When a crafted SLD contains more than 100 Threshold elements inside a ColorMap/Categorize structure, the parser writes beyond the allocated heap buffer, causing a heap‑buffer‑overflow. The resulting overflow generally crashes the MapServer process, leading to a denial‑of‑service attack. The vulnerability is identified as a heap buffer overflow (CWE‑787) and does not provide a direct path to code execution.

Affected Systems

MapServer, the open‑source web‑GIS platform, is impacted from version 4.2 up to, but not including, 8.6.1. Any deployment running a vulnerable MapServer instance that accepts remote SLD_BODY requests over the Web Map Service (WMS) interface is susceptible. Version 8.6.1 and later contain the patch that eliminates the overflow bug.

Risk and Exploitability

With a CVSS score of 5.3, the severity is considered medium; exploitation requires a remote, unauthenticated attacker to deliver a crafted SLD through the WMS GetMap request. EPSS data is not available, and the issue is not listed in CISA’s KEV catalog, suggesting a lower likelihood of widespread exploitation today. Nonetheless, because the condition can be triggered remotely, the risk to availability remains significant for exposed services.

Generated by OpenCVE AI on March 27, 2026 at 06:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest MapServer release (8.6.1 or newer) that patches the heap‑buffer‑overflow bug.
  • If an upgrade is not immediately feasible, restrict WMS access to trusted clients or remove the ability to provide custom SLD_BODY requests.
  • Consider deploying a Web Application Firewall (WAF) rule to reject SLD_BODY payloads containing more than 100 Threshold elements.
  • Verify that the MapServer configuration does not expose the vulnerable SLD parsing path to public networks.

Generated by OpenCVE AI on March 27, 2026 at 06:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Mapserver
Mapserver mapserver
Vendors & Products Mapserver
Mapserver mapserver

Fri, 27 Mar 2026 04:00:00 +0000

Type Values Removed Values Added
Description MapServer is a system for developing web-based GIS applications. Starting in version 4.2 and prior to version 8.6.1, a heap-buffer-overflow write in MapServer’s SLD (Styled Layer Descriptor) parser lets a remote, unauthenticated attacker crash the MapServer process by sending a crafted SLD with more than 100 Threshold elements inside a ColorMap/Categorize structure (commonly reachable via WMS GetMap with SLD_BODY). Version 8.6.1 patches the issue.
Title MapServer has heap buffer overflow in SLD `Categorize` Threshold parsing
Weaknesses CWE-787
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}


Subscriptions

Mapserver Mapserver
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-27T00:15:00.360Z

Reserved: 2026-03-23T17:34:57.559Z

Link: CVE-2026-33721

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-27T01:16:19.670

Modified: 2026-03-27T01:16:19.670

Link: CVE-2026-33721

cve-icon Redhat

Severity : Important

Publid Date: 2026-03-27T00:15:00Z

Links: CVE-2026-33721 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:22:36Z

Weaknesses