CVE-2024-36401

CRITICAL KEV NUCLEI LAB

Geoserver unauthenticated Remote Code Execution

Title source: metasploit

Description

GeoServer is an open source server that allows users to share and edit geospatial data. Prior to versions 2.22.6, 2.23.6, 2.24.4, and 2.25.2, multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer installation due to unsafely evaluating property names as XPath expressions. The GeoTools library API that GeoServer calls evaluates property/attribute names for feature types in a way that unsafely passes them to the commons-jxpath library which can execute arbitrary code when evaluating XPath expressions. This XPath evaluation is intended to be used only by complex feature types (i.e., Application Schema data stores) but is incorrectly being applied to simple feature types as well which makes this vulnerability apply to **ALL** GeoServer instances. No public PoC is provided but this vulnerability has been confirmed to be exploitable through WFS GetFeature, WFS GetPropertyValue, WMS GetMap, WMS GetFeatureInfo, WMS GetLegendGraphic and WPS Execute requests. This vulnerability can lead to executing arbitrary code. Versions 2.22.6, 2.23.6, 2.24.4, and 2.25.2 contain a patch for the issue. A workaround exists by removing the `gt-complex-x.y.jar` file from the GeoServer where `x.y` is the GeoTools version (e.g., `gt-complex-31.1.jar` if running GeoServer 2.25.1). This will remove the vulnerable code from GeoServer but may break some GeoServer functionality or prevent GeoServer from deploying if the gt-complex module is needed.

Exploits (26)

nomisec SUSPICIOUS 120 stars
by whitebear-ch · poc
https://github.com/whitebear-ch/GeoServerExploit
nomisec WORKING POC 86 stars
by Chocapikk · remote
https://github.com/Chocapikk/CVE-2024-36401
nomisec WORKING POC 53 stars
by Mr-xn · remote
https://github.com/Mr-xn/CVE-2024-36401
nomisec WORKING POC 41 stars
by ahisec · remote
https://github.com/ahisec/geoserver-
nomisec WORKING POC 37 stars
by bmth666 · remote
https://github.com/bmth666/GeoServer-Tools-CVE-2024-36401
nomisec WORKING POC 35 stars
by bigb0x · remote
https://github.com/bigb0x/CVE-2024-36401
nomisec WORKING POC 4 stars
by justin-p · remote
https://github.com/justin-p/geoexplorer
nomisec WORKING POC 4 stars
by Niuwoo · remote
https://github.com/Niuwoo/CVE-2024-36401
nomisec WORKING POC 3 stars
by daniellowrie · remote
https://github.com/daniellowrie/CVE-2024-36401-PoC
nomisec WORKING POC 2 stars
by 0x0d3ad · remote
https://github.com/0x0d3ad/CVE-2024-36401
nomisec WORKING POC 1 stars
by URJACK2025 · remote
https://github.com/URJACK2025/CVE-2024-36401
nomisec WORKING POC 1 stars
by amoy6228 · remote
https://github.com/amoy6228/CVE-2024-36401_Geoserver_RCE_POC
nomisec WORKING POC 1 stars
by punitdarji · remote
https://github.com/punitdarji/GeoServer-CVE-2024-36401
nomisec SUSPICIOUS 1 stars
by RevoltSecurities · remote
https://github.com/RevoltSecurities/CVE-2024-36401
nomisec WORKING POC
by mantanhacker · remote
https://github.com/mantanhacker/CVE-2024-36401-MASS
nomisec WORKING POC
by funnyDog896 · poc
https://github.com/funnyDog896/CVE-2024-36401-WoodpeckerPlugin
nomisec WORKING POC
by kkhackz0013 · remote
https://github.com/kkhackz0013/CVE-2024-36401
nomisec WORKING POC
by y1s4s · poc
https://github.com/y1s4s/CVE-2024-36401-PoC
nomisec SCANNER
by jakabakos · remote
https://github.com/jakabakos/CVE-2024-36401-GeoServer-RCE
vulncheck_xdb WORKING POC
remote
https://github.com/H1ng007/CVE-2024-3640_WafBypass
vulncheck_xdb WORKING POC
remote
https://github.com/netuseradministrator/CVE-2024-36401
vulncheck_xdb WORKING POC
remote
https://github.com/yisas93/CVE-2024-36401-PoC
metasploit WORKING POC EXCELLENT
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/geoserver_unauth_rce_cve_2024_36401.rb

Nuclei Templates (1)

GeoServer RCE in Evaluating Property Name Expressions
CRITICALVERIFIEDby DhiyaneshDk,ryanborum
Shodan: Server: GeoHttpServer
FOFA: title="geoserver" || app="geoserver"

Scores

CVSS v3 9.8
EPSS 0.9443
EPSS Percentile 100.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2024-07-15
VulnCheck KEV 2024-07-03
InTheWild.io 2024-07-15
ENISA EUVD EUVD-2024-2280
CWE
CWE-95 CWE-94
Status published
Products (7)
geoserver/geoserver < 2.22.6
geotools/geotools 30.0 (2 CPE variants)
geotools/geotools 31.0 (2 CPE variants)
geotools/geotools < 29.6
org.geoserver/gs-wfs 2.24.0 - 2.24.4Maven
org.geoserver/gs-wms 2.24.0 - 2.24.4Maven
org.geoserver.web/gs-web-app 2.24.0 - 2.24.4Maven
Published Jul 01, 2024
KEV Added Jul 15, 2024
Tracked Since Feb 18, 2026