CVE-2023-25157
Java vulnerability analysis and mitigation

Overview

GeoServer, an open-source software server written in Java for sharing and editing geospatial data, was found to contain SQL Injection vulnerabilities (CVE-2023-25157). The vulnerability was discovered and disclosed on February 21, 2023. The issue affects GeoServer versions prior to 2.21.4, 2.22.2, 2.20.7, 2.19.7, and 2.18.7, specifically impacting the OGC Filter expression language and OGC Common Query Language (CQL) functionality within the Web Feature Service (WFS), Web Map Service (WMS), and Web Coverage Service (WCS) protocols (GeoServer Advisory).

Technical details

The vulnerability received a CVSS v3.1 score of 9.8 (Critical), with attack vector being Network, attack complexity Low, requiring no privileges or user interaction. The SQL injection vulnerabilities were found in multiple components: PropertyIsLike filter (when used with String fields), strEndsWith and strStartsWith functions (with PostGIS DataStore), FeatureId filter (with String primary key columns), jsonArrayContains function (with String/JSON fields), and DWithin filter (with Oracle DataStore). The vulnerability is tracked as CWE-89 (SQL Injection) (GeoServer Advisory).

Impact

Successful exploitation of this vulnerability could allow attackers to view, add, modify, or delete information in the back-end database. The impact includes potential identity spoofing, data tampering, repudiation issues, complete disclosure of system data, data destruction, and potential elevation to database administrator privileges (Security Online).

Mitigation and workarounds

Several mitigation options are available: 1) Upgrade to patched versions (2.21.4, 2.22.2, 2.20.7, 2.19.7, or 2.18.7), 2) Disable the PostGIS Datastore encode functions setting to mitigate strEndsWith and strStartsWith vulnerabilities, 3) Enable the PostGIS DataStore preparedStatements setting to mitigate the FeatureId vulnerability. Note that Like filters have no mitigation if there is a string field in the feature type published (GeoServer Advisory).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-43814MEDIUM6.9
  • JavaJava
  • com.liferay:com.liferay.portal.security.audit.event.generators.user.management
NoYesSep 22, 2025
CVE-2025-59822MEDIUM6.3
  • JavaJava
  • org.http4s:http4s-ember-core_2.12
NoYesSep 23, 2025
CVE-2025-43810MEDIUM5.3
  • JavaJava
  • cpe:2.3:a:liferay:liferay_portal
NoYesSep 22, 2025
CVE-2025-4760MEDIUM4.8
  • JavaJava
  • org.wso2.carbon.apimgt:org.wso2.carbon.apimgt.api
NoYesSep 23, 2025
CVE-2024-6429MEDIUM4.3
  • JavaJava
  • org.wso2.identity.apps:authentication-portal
NoYesSep 23, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management