Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4506-1 | mapserver security update |
EUVD |
EUVD-2025-30323 | MapServer is a system for developing web-based GIS applications. Prior to 8.4.1, the XML Filter Query directive PropertyName is vulnerably to Boolean-based SQL injection. It seems like expression checking is bypassed by introducing double quote characters in the PropertyName. Allowing to manipulate backend database queries. This vulnerability is fixed in 8.4.1. |
Wed, 08 Oct 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Osgeo
Osgeo mapserver |
|
| CPEs | cpe:2.3:a:osgeo:mapserver:8.4.0:-:*:*:*:*:*:* | |
| Vendors & Products |
Osgeo
Osgeo mapserver |
|
| Metrics |
cvssV3_1
|
Mon, 22 Sep 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mapserver
Mapserver mapserver |
|
| Vendors & Products |
Mapserver
Mapserver mapserver |
Fri, 19 Sep 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 19 Sep 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | MapServer is a system for developing web-based GIS applications. Prior to 8.4.1, the XML Filter Query directive PropertyName is vulnerably to Boolean-based SQL injection. It seems like expression checking is bypassed by introducing double quote characters in the PropertyName. Allowing to manipulate backend database queries. This vulnerability is fixed in 8.4.1. | |
| Title | MapServer - WFS XML Filter Query SQL injection | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-09-19T19:42:16.930Z
Reserved: 2025-09-15T19:13:16.905Z
Link: CVE-2025-59431
Updated: 2025-09-19T19:41:54.939Z
Status : Analyzed
Published: 2025-09-19T20:15:40.177
Modified: 2025-10-08T18:26:15.403
Link: CVE-2025-59431
No data.
OpenCVE Enrichment
Updated: 2025-09-22T09:58:57Z
Debian DLA
EUVD