CVE-2023-43795
HIGH EXPLOITED NUCLEIGeoServer - SSRF
Title source: llmDescription
GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. The OGC Web Processing Service (WPS) specification is designed to process information from any server using GET and POST requests. This presents the opportunity for Server Side Request Forgery. This vulnerability has been patched in version 2.22.5 and 2.23.2.
Nuclei Templates (1)
GeoServer WPS - Server Side Request Forgery
CRITICALVERIFIEDby DhiyaneshDK
Shodan:
title:"GeoServer" || http.title:"geoserver"
FOFA:
app="GeoServer" || app="geoserver" || title="geoserver"
Scores
CVSS v3
8.6
EPSS
0.8949
EPSS Percentile
99.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
Details
VulnCheck KEV
2024-07-22
CWE
CWE-918
Status
published
Products (2)
org.geoserver.extension/gs-wps-core
0 - 2.22.5Maven
osgeo/geoserver
< 2.22.5
Published
Oct 25, 2023
Tracked Since
Feb 18, 2026