{"api_version":"1","generated_at":"2026-04-22T22:50:41+00:00","cve":"CVE-2023-26043","urls":{"html":"https://cve.report/CVE-2023-26043","api":"https://cve.report/api/cve/CVE-2023-26043.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-26043","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-26043"},"summary":{"title":"CVE-2023-26043","description":"GeoNode is an open source platform that facilitates the creation, sharing, and collaborative use of geospatial data. GeoNode is vulnerable to an XML External Entity (XXE) injection in the style upload functionality of GeoServer leading to Arbitrary File Read. This issue has been patched in version 4.0.3.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2023-02-27 21:15:00","updated_at":"2023-11-07 04:09:00"},"problem_types":["CWE-611"],"metrics":[],"references":[{"url":"https://github.com/GeoNode/geonode/security/advisories/GHSA-mcmc-c59m-pqq8","name":"https://github.com/GeoNode/geonode/security/advisories/GHSA-mcmc-c59m-pqq8","refsource":"MISC","tags":[],"title":"XML External Entity (XXE) injection in GeoServer style upload functionality · Advisory · GeoNode/geonode · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/GeoNode/geonode/commit/2fdfe919f299b21f1609bf898f9dcfde58770ac0","name":"https://github.com/GeoNode/geonode/commit/2fdfe919f299b21f1609bf898f9dcfde58770ac0","refsource":"MISC","tags":[],"title":"[Fixes #10462] GeoNode is vulnerable to an XML External Entity (XXE) … · GeoNode/geonode@2fdfe91 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-26043","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-26043","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"26043","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"geosolutionsgroup","cpe5":"geonode","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"26043","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"osgeo","cpe5":"geonode","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-26043","ASSIGNER":"security-advisories@github.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"GeoNode is an open source platform that facilitates the creation, sharing, and collaborative use of geospatial data. GeoNode is vulnerable to an XML External Entity (XXE) injection in the style upload functionality of GeoServer leading to Arbitrary File Read. This issue has been patched in version 4.0.3."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-611: Improper Restriction of XML External Entity Reference","cweId":"CWE-611"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"GeoNode","product":{"product_data":[{"product_name":"geonode","version":{"version_data":[{"version_affected":"=","version_value":"< 4.0.3"}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/GeoNode/geonode/security/advisories/GHSA-mcmc-c59m-pqq8","refsource":"MISC","name":"https://github.com/GeoNode/geonode/security/advisories/GHSA-mcmc-c59m-pqq8"},{"url":"https://github.com/GeoNode/geonode/commit/2fdfe919f299b21f1609bf898f9dcfde58770ac0","refsource":"MISC","name":"https://github.com/GeoNode/geonode/commit/2fdfe919f299b21f1609bf898f9dcfde58770ac0"}]},"source":{"advisory":"GHSA-mcmc-c59m-pqq8","discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}]}},"nvd":{"publishedDate":"2023-02-27 21:15:00","lastModifiedDate":"2023-11-07 04:09:00","problem_types":["CWE-611"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:geosolutionsgroup:geonode:*:*:*:*:*:*:*:*","versionEndExcluding":"4.0.3","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}