CVE-2024-36401:
Remote Code Execution (RCE) vulnerability in geoserver
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.99977%
CWE
Published
7/1/2024
Updated
3/19/2025
KEV Status
Yes
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.geoserver.web:gs-web-app | maven | >= 2.24.0, < 2.24.4 | 2.24.4 |
org.geoserver:gs-wfs | maven | >= 2.24.0, < 2.24.4 | 2.24.4 |
org.geoserver:gs-wms | maven | >= 2.24.0, < 2.24.4 | 2.24.4 |
org.geoserver.web:gs-web-app | maven | >= 2.25.0, < 2.25.2 | 2.25.2 |
org.geoserver:gs-wfs | maven | >= 2.25.0, < 2.25.2 | 2.25.2 |
org.geoserver:gs-wms | maven | >= 2.25.0, < 2.25.2 | 2.25.2 |
org.geoserver.web:gs-web-app | maven | >= 2.23.0, < 2.23.6 | 2.23.6 |
org.geoserver:gs-wfs | maven | >= 2.23.0, < 2.23.6 | 2.23.6 |
org.geoserver:gs-wms | maven | >= 2.23.0, < 2.23.6 | 2.23.6 |
org.geoserver.web:gs-web-app | maven | < 2.22.6 | 2.22.6 |
org.geoserver:gs-wfs | maven | < 2.22.6 | 2.22.6 |
org.geoserver:gs-wms | maven | < 2.22.6 | 2.22.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from GeoTools methods passing user-controlled XPath expressions to Apache Commons JXPath without proper security controls. The advisory explicitly lists these functions as vulnerable entry points that execute via commons-jxpath
. The patch (GEOT-7587) introduces JXPathUtils.newSafeContext
to disable function execution, confirming these functions previously lacked this protection. The functions are in code paths handling OGC requests (WFS/WMS/WPS), matching the exploit vectors described. High confidence comes from direct references in security advisories, patch diffs showing security improvements to these methods, and CVE analysis confirming RCE through XPath evaluation.