CVE-2025-59431

MapServer is a system for developing web-based GIS applications. Prior to 8.4.1, the XML Filter Query directive PropertyName is vulnerably to Boolean-based SQL injection. It seems like expression checking is bypassed by introducing double quote characters in the PropertyName. Allowing to manipulate backend database queries. This vulnerability is fixed in 8.4.1.
Configurations

Configuration 1 (hide)

cpe:2.3:a:osgeo:mapserver:8.4.0:-:*:*:*:*:*:*

History

08 Oct 2025, 18:26

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References () https://github.com/MapServer/MapServer/security/advisories/GHSA-256m-rx4h-r55w - () https://github.com/MapServer/MapServer/security/advisories/GHSA-256m-rx4h-r55w - Exploit, Vendor Advisory
First Time Osgeo mapserver
Osgeo
CPE cpe:2.3:a:osgeo:mapserver:8.4.0:-:*:*:*:*:*:*

19 Sep 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-19 20:15

Updated : 2025-10-08 18:26


NVD link : CVE-2025-59431

Mitre link : CVE-2025-59431

CVE.ORG link : CVE-2025-59431


JSON object : View

Products Affected

osgeo

  • mapserver
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')