Executive Summary
In June 2024, U.S. federal agencies were ordered by CISA to immediately patch a critical vulnerability in GeoServer, an open-source geospatial server widely deployed across government networks. Threat actors were observed actively exploiting an XML External Entity (XXE) injection flaw that allows attackers to access sensitive files, exfiltrate data, and potentially pivot within federal environments. The exploitation, which was discovered in the wild, underscores how quickly attackers can weaponize unpatched vulnerabilities to compromise mission-critical public sector infrastructure, putting sensitive government information at risk.
This incident highlights a recent spike in the exploitation of internet-facing open-source software by both cybercriminal and nation-state groups. With regulatory pressure mounting around software supply chain risks and zero-day response times, such vulnerabilities remain a primary vehicle for initial access in sophisticated cyberattacks.
Why This Matters Now
This GeoServer vulnerability is being actively exploited in the wild, creating an urgent need for federal and critical infrastructure organizations to patch rapidly. The incident demonstrates the ongoing challenges of defending widely deployed open-source components, a key risk amid escalating regulatory scrutiny and increasingly sophisticated attacker tactics.
Attack Path Analysis
Attackers exploited an unauthenticated XXE vulnerability in a public GeoServer service to achieve initial compromise. By leveraging this flaw, they gained initial foothold with the application's privileges and sought ways to escalate privilege to access sensitive data and resources. They then attempted to move laterally within the cloud or hybrid environment, possibly targeting internal systems or other services. The attackers established command and control to receive instructions or tools, potentially using outbound web or DNS channels. Subsequently, they exfiltrated data from the environment, typically via encrypted or covert channels. Finally, the attackers could cause impact by disrupting services, destroying data, or staging for further ransom or destructive actions.
Kill Chain Progression
Initial Compromise
Description
Adversaries exploited an Internet-exposed GeoServer instance with an XXE vulnerability to gain unauthorized application access.
Related CVEs
CVE-2025-30220
CVSS 9.9An XML External Entity (XXE) vulnerability in GeoServer's GeoTools Schema class allows unauthenticated remote attackers to read arbitrary files and perform server-side request forgery (SSRF) via crafted XML input.
Affected Products:
OSGeo GeoServer – < 2.25.7, 2.26.0 - 2.26.2, 2.27.0
OSGeo GeoTools – < 28.6.1, 31.0 - 31.6, 32.0 - 32.2, 33.0
OSGeo GeoNetwork – < 4.2.13, 4.4.0 - 4.4.7
Exploit Status:
exploited in the wildCVE-2025-58360
CVSS 8.2An XML External Entity (XXE) vulnerability in GeoServer's WMS GetMap feature allows unauthenticated remote attackers to read arbitrary files and perform server-side request forgery (SSRF) via crafted XML input.
Affected Products:
OSGeo GeoServer – < 2.25.6, 2.26.0 - 2.26.1
Exploit Status:
exploited in the wild
MITRE ATT&CK® Techniques
Exploit Public-Facing Application
External Remote Services
Template Injection
Drive-by Compromise
Endpoint Denial of Service
Command and Scripting Interpreter
Exfiltration Over C2 Channel
Man-in-the-Middle
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Security of Public-Facing Applications
Control ID: 6.2.3
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA (EU Digital Operational Resilience Act) – ICT Vulnerability Management
Control ID: Article 10
CISA ZTMM 2.0 – Continuous vulnerability detection and remediation
Control ID: Asset Management – Vulnerability Mitigation
NIS2 Directive – Cybersecurity Risk Management Measures
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Government Administration
Federal agencies face critical GeoServer XXE vulnerability exploitation, requiring immediate patching per CISA directive to prevent data exfiltration and lateral movement attacks.
Information Technology/IT
IT infrastructure heavily relies on GeoServer mapping services, creating widespread exposure to XXE injection attacks enabling system compromise and unauthorized access.
Defense/Space
Military and defense systems using geospatial data processing face critical security risks from actively exploited GeoServer vulnerabilities compromising sensitive operational intelligence.
Utilities
Power grids and utility infrastructure dependent on geographic information systems vulnerable to XXE attacks potentially disrupting critical services and operational technology.
Sources
- CISA orders feds to patch actively exploited Geoserver flawhttps://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-actively-exploited-geoserver-flaw/Verified
- CISA Adds One Known Exploited Vulnerability to Cataloghttps://www.cisa.gov/news-events/alerts/2024/07/15/cisa-adds-one-known-exploited-vulnerability-catalogVerified
- GeoServer is vulnerable to Unauthenticated XML External Entities (XXE) attack via WMS GetMap featurehttps://github.com/advisories/GHSA-fjf5-xgmq-5525Verified
- NVD - CVE-2025-30220https://nvd.nist.gov/vuln/detail/CVE-2025-30220Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Zero Trust segmentation, workload-level egress controls, inline IPS, and threat detection would have significantly reduced attack surface, intercepted exploit traffic, constrained lateral movement, and detected/prevented both outbound data theft and destructive actions throughout the attack lifecycle.
Control: Cloud Firewall (ACF)
Mitigation: Unapproved inbound traffic would have been blocked at the network perimeter.
Control: Threat Detection & Anomaly Response
Mitigation: Unusual privilege elevation or credential use detected and alerted.
Control: Zero Trust Segmentation
Mitigation: Movement between services/workloads blocked by least privilege and segmentation rules.
Control: Egress Security & Policy Enforcement
Mitigation: Outbound connections to unauthorized destinations are denied and logged.
Control: Egress Security & Policy Enforcement
Mitigation: Data exfiltration attempts detected and prevented via FQDN filtering and outbound policy.
Malicious activities and attempts at destruction or ransomware detected early for response.
Impact at a Glance
Affected Business Functions
- Geospatial Data Services
- Mapping Applications
- GIS Analysis
Estimated downtime: 3 days
Estimated loss: $50,000
Potential exposure of sensitive geospatial data, including proprietary maps and client information, due to unauthorized file access.
Recommended Actions
Key Takeaways & Next Steps
- • Institute Cloud Firewall and Zero Trust segmentation to restrict public and internal lateral access.
- • Enforce rigorous egress controls to prevent unmonitored data exfiltration and command and control activity.
- • Deploy inline IPS and advanced threat detection to rapidly identify exploitation attempts and behavioral anomalies.
- • Ensure continuous visibility across all cloud and hybrid workloads and enforce least privilege with microsegmentation.
- • Immediately patch known vulnerabilities (like the GeoServer XXE flaw) and automate vulnerability management.



