CVE-2025-59431

EUVD-2025-30323
MapServer is a system for developing web-based GIS applications. Prior to 8.4.1, the XML Filter Query directive PropertyName is vulnerably to Boolean-based SQL injection. It seems like expression checking is bypassed by introducing double quote characters in the PropertyName. Allowing to manipulate backend database queries. This vulnerability is fixed in 8.4.1.
SQL Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Affected Products (NVD)
VendorProductVersion
osgeomapserver
8.4.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
mapserver
bookworm
vulnerable
bullseye
vulnerable
bullseye (security)
7.6.2-1+deb11u1
fixed
forky
8.6.1-1
fixed
sid
8.6.1-1
fixed
trixie
8.4.0-4+deb13u1
fixed