MapTiler Tileserver-php v2.0 is vulnerable to Cross Site Scripting (XSS). The GET parameter "layer" is reflected in an error message without html encoding. This leads to XSS and allows an unauthenticated attacker to execute arbitrary HTML or JavaScript code on a victim's browser.
References
Link | Resource |
---|---|
https://github.com/maptiler/tileserver-php/issues/167 | Exploit Issue Tracking |
https://github.com/mheranco/CVE-2025-44136 | Exploit |
Configurations
History
06 Aug 2025, 20:47
Type | Values Removed | Values Added |
---|---|---|
First Time |
Maptiler tileserver Php
Maptiler |
|
References | () https://github.com/maptiler/tileserver-php/issues/167 - Exploit, Issue Tracking | |
References | () https://github.com/mheranco/CVE-2025-44136 - Exploit | |
CPE | cpe:2.3:a:maptiler:tileserver_php:2.0:*:*:*:*:*:*:* |
31 Jul 2025, 18:42
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
29 Jul 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-79 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
29 Jul 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-29 17:15
Updated : 2025-08-06 20:47
NVD link : CVE-2025-44136
Mitre link : CVE-2025-44136
CVE.ORG link : CVE-2025-44136
JSON object : View
Products Affected
maptiler
- tileserver_php
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')