{"api_version":"1","generated_at":"2026-04-22T22:50:42+00:00","cve":"CVE-2023-43795","urls":{"html":"https://cve.report/CVE-2023-43795","api":"https://cve.report/api/cve/CVE-2023-43795.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-43795","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-43795"},"summary":{"title":"CVE-2023-43795","description":"GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. The OGC Web Processing Service (WPS) specification is designed to process information from any server using GET and POST requests. This presents the opportunity for Server Side Request Forgery. This vulnerability has been patched in version 2.22.5 and 2.23.2.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2023-10-25 18:17:00","updated_at":"2023-11-01 16:19:00"},"problem_types":["CWE-918"],"metrics":[],"references":[{"url":"https://github.com/geoserver/geoserver/security/advisories/GHSA-5pr3-m5hm-9956","name":"https://github.com/geoserver/geoserver/security/advisories/GHSA-5pr3-m5hm-9956","refsource":"MISC","tags":[],"title":"WPS Server Side Request Forgery · Advisory · geoserver/geoserver · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-43795","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-43795","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"43795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"osgeo","cpe5":"geoserver","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-43795","qid":"150752","title":"GeoServer Web Processing Service (WPS) Server-Side Request Forgery (SSRF) Vulnerability (CVE-2023-43795)"},{"cve":"CVE-2023-43795","qid":"995697","title":"Java (Maven) Security Update for org.geoserver.extension:gs-wps-core (GHSA-5pr3-m5hm-9956)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-43795","ASSIGNER":"security-advisories@github.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. The OGC Web Processing Service (WPS) specification is designed to process information from any server using GET and POST requests. This presents the opportunity for Server Side Request Forgery. This vulnerability has been patched in version 2.22.5 and 2.23.2."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-918: Server-Side Request Forgery (SSRF)","cweId":"CWE-918"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"geoserver","product":{"product_data":[{"product_name":"geoserver","version":{"version_data":[{"version_affected":"=","version_value":"< 2.22.5"},{"version_affected":"=","version_value":">= 2.23.0, < 2.23.2"}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/geoserver/geoserver/security/advisories/GHSA-5pr3-m5hm-9956","refsource":"MISC","name":"https://github.com/geoserver/geoserver/security/advisories/GHSA-5pr3-m5hm-9956"}]},"source":{"advisory":"GHSA-5pr3-m5hm-9956","discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":8.6,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L","version":"3.1"}]}},"nvd":{"publishedDate":"2023-10-25 18:17:00","lastModifiedDate":"2023-11-01 16:19:00","problem_types":["CWE-918"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:osgeo:geoserver:*:*:*:*:*:*:*:*","versionStartIncluding":"2.23.0","versionEndExcluding":"2.23.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:osgeo:geoserver:*:*:*:*:*:*:*:*","versionEndExcluding":"2.22.5","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}