CVE-2026-42030
MEDIUMMapServer: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in OpenLayers viewer
Title source: cnaDescription
MapServer is a system for developing web-based GIS applications. From version 6.0 to before version 8.6.2, a reflected XSS vulnerability in MapServer's WMS server allows an unauthenticated attacker to inject arbitrary HTML/JavaScript into the browser of any user who opens a crafted WMS URL. The vulnerability is triggered via FORMAT=application/openlayers combined with an unsanitized SRS parameter in WMS 1.3.0 requests. This issue has been patched in version 8.6.2.
References (2)
Core 2
Core References
X_Refsource_Confirm x_refsource_confirm
https://github.com/MapServer/MapServer/security/advisories/GHSA-4g9f-ph64-hg2x
X_Refsource_Misc x_refsource_misc
https://github.com/MapServer/MapServer/releases/tag/rel-8-6-2
Scores
CVSS v3
6.1
EPSS
0.0002
EPSS Percentile
6.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-80
Status
published
Products (1)
MapServer/MapServer
>= 6.0, < 8.6.2
Published
May 08, 2026
Tracked Since
May 08, 2026