CVE-2023-43795
WPS Server Side Request Forgery in GeoServer
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- September 22, 2023
- Published Date
- October 24, 2023
- Last Updated
- September 17, 2024
- Vendor
- geoserver
- Product
- geoserver
- Description
- GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. The OGC Web Processing Service (WPS) specification is designed to process information from any server using GET and POST requests. This presents the opportunity for Server Side Request Forgery. This vulnerability has been patched in version 2.22.5 and 2.23.2.
CVSS Scores
CVSS v3.1
8.6 - HIGH
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
EPSS Score
- Score
- 90.70% (Percentile: 99.58%) as of 2025-04-29
SSVC Information
- Exploitation
- none
- Automatable
- Yes
- Technical Impact
- partial
Exploit Status
- Exploited in the Wild
- Yes (added 2025-04-26 00:00:00 UTC) Source
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
The Shadowserver (via CIRCL) | 2025-04-26 00:00:00 UTC |
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Nuclei | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-43795.yaml | 2025-04-26 00:00:00 UTC |