CISA Orders Federal Agencies to Patch Actively Exploited Critical GeoServer XXE Flaw

CISA Adds Critical GeoServer XXE Vulnerability (CVE-2025-58360) to KEV Catalog Amid Active Exploitation

CRITICAL
December 16, 2025
5m read
VulnerabilityThreat IntelligenceRegulatory

Related Entities

Organizations

CISA Federal Civilian Executive Branch (FCEB)

Products & Tech

OSGeo GeoServer

CVE Identifiers

CVE-2025-58360
CRITICAL
CVSS:9.8

Full Report

Executive Summary

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a directive concerning CVE-2025-58360, a critical unauthenticated XML External Entity (XXE) injection vulnerability in OSGeo GeoServer. With a CVSS score ranging from 8.2 to 9.8, the flaw is being actively exploited in the wild. This has prompted CISA to add it to its Known Exploited Vulnerabilities (KEV) catalog, requiring federal agencies to apply patches by January 1, 2026. The vulnerability allows remote, unauthenticated attackers to exfiltrate sensitive files, pivot to internal networks via Server-Side Request Forgery (SSRF), or cause a denial of service. Given GeoServer's widespread use for sharing geospatial data, all organizations utilizing this software are at significant risk and should prioritize remediation.

Vulnerability Details

  • CVE-2025-58360: Unauthenticated XML External Entity (XXE) Injection
  • CVSS Score: 8.2 to 9.8 (Critical)
  • Attack Vector: Remote / Unauthenticated

The vulnerability exists in the /geoserver/wms endpoint during GetMap operations. GeoServer fails to properly sanitize user-supplied XML input, allowing an attacker to submit a crafted XML payload containing external entity declarations.

An attacker can exploit this flaw in several ways:

  1. Arbitrary File Disclosure: By referencing local files (e.g., /etc/passwd, configuration files with credentials) in the XML payload, an attacker can exfiltrate their contents.
  2. Server-Side Request Forgery (SSRF): The attacker can force the GeoServer instance to make requests to other systems on the internal network, enabling network reconnaissance and potential pivots to other vulnerable internal services.
  3. Denial of Service (DoS): A malicious XML payload can trigger a 'billion laughs' attack, consuming all available server memory and causing a crash.

Affected Systems

  • GeoServer versions up to 2.26.0 (Patched in 2.26.2 and newer)
  • GeoServer versions up to 2.25.0 (Patched in 2.25.6 and newer)

Exploitation Status

CISA has confirmed that CVE-2025-58360 is being actively exploited in the wild. While specific details about the threat actors or their targets have not been released, the inclusion in the KEV catalog indicates observed, real-world attacks. Unauthenticated, high-impact vulnerabilities like this are prime targets for both opportunistic cybercriminals and state-sponsored actors for initial access and data theft.

Impact Assessment

Successful exploitation of this vulnerability can have severe consequences. The exfiltration of configuration files could expose database credentials, API keys, or other secrets, leading to a full system compromise. The SSRF capability transforms a public-facing server into a pivot point, bypassing perimeter defenses and allowing attackers to map and attack the internal network. For government agencies and companies that rely on GeoServer for critical mapping and location-based services, a DoS attack could disrupt essential operations. The addition to the KEV catalog signifies a clear and present danger to all unpatched systems.

Cyber Observables for Detection

Security teams can hunt for signs of exploitation by reviewing web server logs for suspicious requests.

Type Value Description
url_pattern */geoserver/wms* Focus hunting on requests to the vulnerable WMS endpoint.
network_traffic_pattern requests containing "<!ENTITY" In the body of POST requests to the WMS endpoint, look for XML payloads that declare external entities.
log_source Web Server Access Logs Look for GetMap requests that result in unusual error messages or response sizes, which could indicate a failed or successful exploitation attempt.
network_traffic_pattern Outbound connections from GeoServer to internal IPs Monitor for network connections originating from the GeoServer host to other internal systems, which could be indicative of an SSRF attack.

Detection Methods

  • Vulnerability Scanning: Use authenticated and unauthenticated scans to identify vulnerable GeoServer versions on your network.
  • Log Analysis: Ingest GeoServer and web server logs into a SIEM. Create detection rules to alert on requests to the /geoserver/wms endpoint that contain common XXE payloads or keywords like ENTITY, SYSTEM, or PUBLIC. This aligns with D3FEND File Analysis (D3-FA) on inbound request bodies.
  • Network Monitoring: Implement egress filtering on the GeoServer host and monitor for any unexpected outbound connections, especially to internal RFC1918 address space. This is a key part of D3FEND Outbound Traffic Filtering (D3-OTF).

Remediation Steps

  1. Upgrade GeoServer: The most effective solution is to upgrade to a patched version immediately: GeoServer 2.26.2 or 2.25.6 or newer. This is a direct application of D3FEND Software Update (D3-SU).
  2. Apply Workarounds (If Patching is Delayed): If immediate patching is not possible, consider disabling the WMS service if it is not needed. Alternatively, use a Web Application Firewall (WAF) to inspect and block requests containing malicious XML payloads targeting the vulnerable endpoint. A WAF can be configured to drop requests with <!ENTITY in the body, providing a virtual patch.
  3. Review System Configuration: After patching, assume compromise. Review the GeoServer system for any unauthorized changes, check for unexpected local files or processes, and rotate all credentials and secrets stored on the server.

Timeline of Events

1
December 15, 2025
CISA adds CVE-2025-58360 to its Known Exploited Vulnerabilities (KEV) catalog.
2
December 16, 2025
This article was published
3
January 1, 2026
Deadline for U.S. Federal Civilian Executive Branch agencies to patch CVE-2025-58360.

MITRE ATT&CK Mitigations

Upgrading to a patched version of GeoServer is the most effective way to remediate this vulnerability.

Running GeoServer in a containerized or isolated environment can help limit the impact of a successful SSRF attack.

Using a WAF to filter malicious XML payloads and implementing egress filtering to block SSRF attempts are key mitigations.

If the WMS service is not required for business operations, disabling it entirely removes the attack surface.

D3FEND Defensive Countermeasures

The definitive countermeasure for CVE-2025-58360 is to apply the security patches released by the OSGeo project. Organizations must immediately upgrade their GeoServer instances to version 2.26.2, 2.25.6, or newer. Given that this is an unauthenticated, remotely exploitable vulnerability on the CISA KEV list, it should be treated as an emergency change. Asset management systems should be used to identify all instances of GeoServer in the environment, including those in development and staging, as they can also be exploited for pivoting. Patching not only fixes the XXE vulnerability but also protects against the associated risks of data exfiltration, SSRF, and DoS. After patching, it is crucial to verify the update was successful by checking the application's version number.

For organizations unable to immediately patch, Inbound Traffic Filtering via a Web Application Firewall (WAF) can serve as a critical compensating control (virtual patch). The WAF should be configured with rules specifically designed to detect and block XXE attack patterns. A rule should be created to inspect the body of POST requests to the /geoserver/wms endpoint. This rule should block any request containing the string <!ENTITY, which is fundamental to XXE payloads. While attackers may attempt to obfuscate this, a well-configured WAF can detect many variations. This approach prevents the malicious payload from ever reaching the vulnerable GeoServer application. While highly effective as a short-term mitigation, it should not be considered a permanent replacement for applying the official software update, as sophisticated attackers may eventually find ways to bypass WAF rules.

To mitigate the impact of a successful SSRF attack through CVE-2025-58360, strict Outbound Traffic Filtering should be implemented on the host running GeoServer. The server's firewall or cloud security group should be configured with a default-deny policy for all egress traffic. Explicit allow rules should then be created only for the specific connections required for the server's operation (e.g., to a specific database server on its designated port, to known external APIs). Critically, this policy should block all outbound connections from the GeoServer host to the internal network (e.g., RFC1918 IP space), except for those explicitly required. This would prevent an attacker from using the SSRF vulnerability to scan the internal network, connect to other services, or pivot deeper into the environment, effectively containing the breach to the compromised server.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

CVE-2025-58360GeoServerCISAKEVXXESSRFVulnerabilityPatch Management

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading