CVE-2025-30220

| EUVD-2025-17683 CRITICAL
9.9
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
Low
Availability
Low

Lifecycle Timeline

5
EUVD ID Assigned
Mar 14, 2026 - 19:49 euvd
EUVD-2025-17683
Analysis Generated
Mar 14, 2026 - 19:49 vuln.today
Patch Released
Mar 14, 2026 - 19:49 nvd
Patch available
PoC Detected
Aug 26, 2025 - 16:10 vuln.today
Public exploit code
CVE Published
Jun 10, 2025 - 16:15 nvd
CRITICAL 9.9

Description

GeoServer is an open source server that allows users to share and edit geospatial data. GeoTools Schema class use of Eclipse XSD library to represent schema data structure is vulnerable to XML External Entity (XXE) exploit. This impacts whoever exposes XML processing with gt-xsd-core involved in parsing, when the documents carry a reference to an external XML schema. The gt-xsd-core Schemas class is not using the EntityResolver provided by the ParserHandler (if any was configured). This also impacts users of gt-wfs-ng DataStore where the ENTITY_RESOLVER connection parameter was not being used as intended. This vulnerability is fixed in GeoTools 33.1, 32.3, 31.7, and 28.6.1, GeoServer 2.27.1, 2.26.3, and 2.25.7, and GeoNetwork 4.4.8 and 4.2.13.

Analysis

A remote code execution vulnerability in GeoServer (CVSS 9.9) that allows users. Risk factors: public PoC available. Vendor patch is available.

Technical Context

CWE-611 (XML External Entity). CVSS 9.9 indicates critical severity with likely remote exploitation vector. Affects GeoServer.

Affected Products

['GeoServer']

Remediation

Apply the vendor-supplied patch immediately.

Priority Score

78
Low Medium High Critical
KEV: 0
EPSS: +8.4
CVSS: +50
POC: +20

Share

CVE-2025-30220 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy