-
CVSS Score
-The vulnerability stems from insufficient output encoding in the GWC Demos Page rendering logic. The pull request #1173 specifically modifies Demo.java to replace StringEscapeUtils.escapeEcmaScript with OWASP Encoder's forHtmlContent and forHtmlAttribute methods, indicating this was the vulnerable area. The Demo class handles the demo page generation where user-controlled input (layer names/parameters) was rendered without proper HTML context-aware escaping, making it susceptible to stored XSS attacks when malicious payloads are injected into the catalog.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.geoserver:gs-gwc | maven | >= 2.24.0, < 2.24.1 | 2.24.1 |
| org.geoserver:gs-gwc | maven | < 2.23.4 | 2.23.4 |