Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Flags Actively Exploited GeoServer XXE Flaw in Updated KEV Catalog

CISA Flags Actively Exploited GeoServer XXE Flaw in Updated KEV Catalog

Posted on December 12, 2025December 12, 2025 By CWS

Dec 12, 2025Ravie LakshmananVulnerability / Server Safety
The U.S. Cybersecurity and Infrastructure Safety Company (CISA) on Thursday added a high-severity safety flaw impacting OSGeo GeoServer to its Identified Exploited Vulnerabilities (KEV) catalog, based mostly on proof of lively exploitation within the wild.
The vulnerability in query is CVE-2025-58360 (CVSS rating: 8.2), an unauthenticated XML Exterior Entity (XXE) flaw that impacts all variations previous to and together with 2.25.5, and from variations 2.26.0 by way of 2.26.1. It has been patched in variations 2.25.6, 2.26.2, 2.27.0, 2.28.0, and a couple of.28.1. Synthetic intelligence (AI)-powered vulnerability discovery platform XBOW has been acknowledged for reporting the difficulty.
“OSGeo GeoServer comprises an improper restriction of XML exterior entity reference vulnerability that happens when the appliance accepts XML enter by way of a particular endpoint /geoserver/wms operation GetMap and will enable an attacker to outline exterior entities throughout the XML request,” CISA stated.

The next packages are affected by the flaw –

docker.osgeo.org/geoserver
org.geoserver.internet:gs-web-app (Maven)
org.geoserver:gs-wms (Maven)

Profitable exploitation of the vulnerability may enable an attacker to entry arbitrary information from the server’s file system, conduct Server-Facet Request Forgery (SSRF) to work together with inside techniques, or launch a denial-of-service (DoS) assault by exhausting sources, the maintainers of the open-source software program stated in an alert printed late final month.
There are at present no particulars obtainable on how the safety defect is being abused in real-world assaults. Nonetheless, a bulletin from the Canadian Centre for Cyber Safety on November 28, 2025, stated “an exploit for CVE-2025-58360 exists within the wild.”
It is price noting that one other essential flaw in the identical software program (CVE-2024-36401, CVSS rating: 9.8) has been exploited by a number of risk actors over the previous yr. Federal Civilian Government Department (FCEB) businesses are suggested to use the required fixes by January 1, 2026, to safe their networks.

The Hacker News Tags:Actively, Catalog, CISA, Exploited, Flags, Flaw, GeoServer, KEV, Updated, XXE

Post navigation

Previous Post: Trump Signs Executive Order to Block State AI Regulations
Next Post: CISA Warns of OSGeo GeoServer 0-Day Vulnerability Exploited in Attacks

Related Posts

Fortinet FortiGate Under Active Attack Through SAML SSO Authentication Bypass Fortinet FortiGate Under Active Attack Through SAML SSO Authentication Bypass The Hacker News
The Hype We Can Ignore (And the Risks We Can’t) The Hype We Can Ignore (And the Risks We Can’t) The Hacker News
From MCPs and Tool Access to Shadow API Key Sprawl From MCPs and Tool Access to Shadow API Key Sprawl The Hacker News
Why Unmonitored JavaScript Is Your Biggest Holiday Security Risk Why Unmonitored JavaScript Is Your Biggest Holiday Security Risk The Hacker News
The Evolution of UTA0388’s Espionage Malware The Evolution of UTA0388’s Espionage Malware The Hacker News
AI Tools Fuel Brazilian Phishing Scam While Efimer Trojan Steals Crypto from 5,000 Victims AI Tools Fuel Brazilian Phishing Scam While Efimer Trojan Steals Crypto from 5,000 Victims The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark