-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stemmed from two primary issues: 1) Direct string concatenation in OGC filter handling (particularly PropertyIsLike) without parameterization, visible in the FilterToCatalogSQL.java diff where LIKE patterns were moved to parameterized queries. 2) Unsafe comment generation in debug mode, addressed by the escapeComment() method in Dialect.java. The commit shows these functions were modified to add parameter binding and comment escaping, confirming their vulnerable prior state.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.geoserver.community:gs-jdbcconfig | maven | < 2.21.4 | 2.21.4 |
| org.geoserver.community:gs-jdbcconfig | maven | >= 2.22.0, < 2.22.2 | 2.22.2 |
Ongoing coverage of React2Shell