MapServer is a system for developing web-based GIS applications. Prior to 8.4.1, the XML Filter Query directive PropertyName is vulnerably to Boolean-based SQL injection. It seems like expression checking is bypassed by introducing double quote characters in the PropertyName. Allowing to manipulate backend database queries. This vulnerability is fixed in 8.4.1.
References
| Link | Resource |
|---|---|
| https://github.com/MapServer/MapServer/security/advisories/GHSA-256m-rx4h-r55w | Exploit Vendor Advisory |
Configurations
History
08 Oct 2025, 18:26
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| References | () https://github.com/MapServer/MapServer/security/advisories/GHSA-256m-rx4h-r55w - Exploit, Vendor Advisory | |
| First Time |
Osgeo mapserver
Osgeo |
|
| CPE | cpe:2.3:a:osgeo:mapserver:8.4.0:-:*:*:*:*:*:* |
19 Sep 2025, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-19 20:15
Updated : 2025-10-08 18:26
NVD link : CVE-2025-59431
Mitre link : CVE-2025-59431
CVE.ORG link : CVE-2025-59431
JSON object : View
Products Affected
osgeo
- mapserver
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
