Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 14 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Osgeo
Osgeo mapserver |
|
| CPEs | cpe:2.3:a:osgeo:mapserver:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Osgeo
Osgeo mapserver |
Fri, 08 May 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mapserver
Mapserver mapserver |
|
| Vendors & Products |
Mapserver
Mapserver mapserver |
Fri, 08 May 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 08 May 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | MapServer is a system for developing web-based GIS applications. From version 6.0 to before version 8.6.2, a reflected XSS vulnerability in MapServer's WMS server allows an unauthenticated attacker to inject arbitrary HTML/JavaScript into the browser of any user who opens a crafted WMS URL. The vulnerability is triggered via FORMAT=application/openlayers combined with an unsanitized SRS parameter in WMS 1.3.0 requests. This issue has been patched in version 8.6.2. | |
| Title | MapServer: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in OpenLayers viewer | |
| Weaknesses | CWE-80 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-08T21:26:45.294Z
Reserved: 2026-04-23T16:05:01.708Z
Link: CVE-2026-42030
Updated: 2026-05-08T17:12:13.321Z
Status : Analyzed
Published: 2026-05-08T17:16:31.307
Modified: 2026-05-14T18:04:33.627
Link: CVE-2026-42030
No data.
OpenCVE Enrichment
Updated: 2026-05-08T22:45:05Z