CVE-2023-25158
Java vulnerability analysis and mitigation

Overview

GeoTools includes support for OGC Filter expression language parsing, encoding and execution against a range of datastores. The vulnerability (CVE-2023-25158) was discovered and disclosed on February 21, 2023, affecting GeoTools versions below 28.2, 27.4, 26.7, 25.7, and 24.7. This critical SQL injection vulnerability impacts the GeoTools JavaScript module when executing OGC Filters with JDBCDataStore implementations (GitHub Advisory).

Technical details

The vulnerability has a CVSS v3.1 score of 9.8 (Critical), with attack vector being Network, attack complexity Low, requiring no privileges or user interaction. The SQL injection vulnerabilities are found in multiple components: PropertyIsLike filter (affecting PostGIS DataStore with 'encode functions' enabled or any JDBCDataStore with String field), strEndsWith and strStartsWith functions (requiring PostGIS DataStore with 'encode functions' enabled), FeatureId filter (affecting JDBCDataStore with prepared statements disabled and table with String primary key), jsonArrayContains function (affecting PostGIS and Oracle DataStore with String or JSON field), and DWithin filter (affecting Oracle DataStore) (GitHub Advisory).

Impact

Successful exploitation of this vulnerability could allow an attacker to view, add, modify, or delete information in the back-end database. The impact includes potential data breach, data manipulation, and unauthorized access to the database server with administrator privileges (Security Online).

Mitigation and workarounds

Mitigation strategies include upgrading to the patched versions: GeoTools 28.2, 27.4, 26.7, 25.7, or 24.7. For partial mitigation, users can disable 'encode functions' in PostGIS DataStore and enable 'prepared statements' in PostGIS (the only database with such settings). These configuration changes can be implemented through the database connection parameters (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-14306CRITICAL10
  • JavaJava
  • net.sf.robocode:robocode.core
NoYesDec 09, 2025
CVE-2025-14307CRITICAL9.3
  • JavaJava
  • net.sf.robocode:robocode.battle
NoYesDec 09, 2025
CVE-2025-66566HIGH8.2
  • JavaJava
  • at.yawk.lz4:lz4-java
NoYesDec 05, 2025
CVE-2025-66623HIGH7.4
  • JavaJava
  • io.strimzi:strimzi
NoYesDec 05, 2025
GHSA-93fv-4pm9-xp28MEDIUM6.9
  • JavaJava
  • net.dv8tion:jda
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management