AI description
CVE-2024-36401 is a remote code execution (RCE) vulnerability affecting GeoServer, an open-source software server that allows users to share and edit geospatial data. The vulnerability exists in versions prior to 2.22.6, 2.23.6, 2.24.4, and 2.25.2. It stems from the unsafe evaluation of property names as XPath expressions within the GeoTools library API, which GeoServer uses. This API incorrectly passes property/attribute names to the commons-jxpath library, potentially allowing the execution of arbitrary code. The vulnerability can be exploited through multiple Open Geospatial Consortium (OGC) request parameters, including WFS GetFeature, WFS GetPropertyValue, WMS GetMap, WMS GetFeatureInfo, WMS GetLegendGraphic, and WPS Execute. It is applicable to all GeoServer instances because the flawed XPath evaluation, intended for complex feature types, is mistakenly applied to simple feature types as well. A patch is available in versions 2.22.6, 2.23.6, 2.24.4, and 2.25.2. A workaround involves removing the `gt-complex-x.y.jar` file from the GeoServer installation, although this may break some GeoServer functionality.
- Description
- GeoServer is an open source server that allows users to share and edit geospatial data. Prior to versions 2.22.6, 2.23.6, 2.24.4, and 2.25.2, multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer installation due to unsafely evaluating property names as XPath expressions. The GeoTools library API that GeoServer calls evaluates property/attribute names for feature types in a way that unsafely passes them to the commons-jxpath library which can execute arbitrary code when evaluating XPath expressions. This XPath evaluation is intended to be used only by complex feature types (i.e., Application Schema data stores) but is incorrectly being applied to simple feature types as well which makes this vulnerability apply to **ALL** GeoServer instances. No public PoC is provided but this vulnerability has been confirmed to be exploitable through WFS GetFeature, WFS GetPropertyValue, WMS GetMap, WMS GetFeatureInfo, WMS GetLegendGraphic and WPS Execute requests. This vulnerability can lead to executing arbitrary code. Versions 2.22.6, 2.23.6, 2.24.4, and 2.25.2 contain a patch for the issue. A workaround exists by removing the `gt-complex-x.y.jar` file from the GeoServer where `x.y` is the GeoTools version (e.g., `gt-complex-31.1.jar` if running GeoServer 2.25.1). This will remove the vulnerable code from GeoServer but may break some GeoServer functionality or prevent GeoServer from deploying if the gt-complex module is needed.
- Source
- security-advisories@github.com
- NVD status
- Analyzed
- Products
- geoserver, geotools
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
Data from CISA
- Vulnerability name
- OSGeo GeoServer GeoTools Eval Injection Vulnerability
- Exploit added on
- Jul 15, 2024
- Exploit action due
- Aug 5, 2024
- Required action
- Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
- Hype score
- Not currently trending
Actively exploited CVE : CVE-2024-36401
@transilienceai
26 Aug 2025
49 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Cyberattacks are evolving: • GeoServer flaw (CVE-2024-36401) hijacked to sell bandwidth • PolarEdge botnet → 40k devices hiding in firewalls/routers • “Gayfemboy” powering massive DDoS Different names. Same playbook: stealth, scale, profit. #CyberSecurity #ThreatIntel
@Prevent_Cyber
25 Aug 2025
124 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Des chercheurs en cybersécurité alertent sur plusieurs campagnes exploitant des failles comme CVE-2024-36401 pour transformer des serveurs Redis en botnets IoT, proxys résidentiels ou plateformes de minage crypto. 🔒⚠️ #CyberSecurity #IA #Automatisation https://t.co/aW43
@meg_ai_fr
24 Aug 2025
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Cybercriminals Exploit GeoServer RCE (CVE-2024-36401) to Hijack Redis Servers via PolarEdge Campaigns @techshotsapp #Cybercriminals #Hijack #Servers https://t.co/uVafLYFTxU
@techshotsapp
24 Aug 2025
91 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
23/08/2025 GeoServer exploits are on the rise! 🚨 CVE-2024-36401 (CVSS 9.8) highlights severe risks as attackers turn compromised Redis servers into IoT botnets. Stay vigilant and protect your infrastructure. Source: https://t.co/PHD9Q70x5L
@kernyx64
24 Aug 2025
88 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️ Cyberattacks are evolving fast. ➟ Hackers exploit GeoServer (CVE-2024-36401) to hijack internet bandwidth. ➟ PolarEdge botnet stealthily spreads across 40k firewalls & routers. ➟ “Gayfemboy” malware, a Mirai variant, full report at https://t.co/DMh8k7v99o ht
@swiftpointnews
23 Aug 2025
107 Impressions
2 Retweets
5 Likes
0 Bookmarks
0 Replies
0 Quotes
🌐 CVE-2024-36401 GeoServer RCE is being exploited across 7,100+ instances using stealthy Dart binaries to share bandwidth and earn passive income. More: https://t.co/xsC5aLz3m3 #CyberCrimeEvolution #GeoServer #Botnet https://t.co/wt4w2dPWed
@sctocs25
23 Aug 2025
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
GeoServer vulnerability CVE-2024-36401 still exploited for RCE https://t.co/Lh9qUba3aU
@DemolisherDigi
23 Aug 2025
37 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
サイバーセキュリティ研究者らは、Redis サーバーを悪用する複数の攻撃キャンペーンに警鐘を鳴らしている。 報告によると、攻撃者は脆弱性を突き、IoTボットネット、リバースプロキシ、暗号資産マイニング
@yousukezan
23 Aug 2025
2484 Impressions
3 Retweets
20 Likes
9 Bookmarks
0 Replies
0 Quotes
Research shows abuse of Redis servers, highlighting CVE-2024-36401 exploitation for proxy infrastructure. Prioritize triage and validation. https://t.co/EFWh7rCKUZ #SecurityImpact #RedisExploits
@threatlight
23 Aug 2025
50 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
📌 تحذر الباحثون في الأمن السيبراني من حملات متعددة تستغل ثغرات أمنية معروفة، تشمل استغلال خوادم Redis. تشمل الأنشطة الخبيثة استخدام الأجهزة المخترقة كبوت
@Cybercachear
23 Aug 2025
56 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️ Cyberattacks are shifting gears. ➟ One crew hijacks GeoServer (CVE-2024-36401) to quietly sell your internet bandwidth. ➟ Another builds PolarEdge, a 40k-device botnet hidden in firewalls & routers. ➟ And “Gayfemboy” — a Mirai offshoot — spread... http
@IT_news_for_all
23 Aug 2025
15 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️ Cyberattacks are shifting gears. ➟ One crew hijacks GeoServer (CVE-2024-36401) to quietly sell your internet bandwidth. ➟ Another builds PolarEdge, a 40k-device botnet hidden in firewalls & routers. ➟ And “Gayfemboy” — a Mirai offshoot — spreads across
@TheHackersNews
23 Aug 2025
75553 Impressions
41 Retweets
160 Likes
49 Bookmarks
5 Replies
3 Quotes
【帯域幅窃取攻撃】攻撃者がGeoServerの重大な脆弱性CVE-2024-36401(CVSS 9.8)を悪用し、被害者のインターネット帯域幅を密かに収益化する新たな攻撃キャンペーンが発見された。正規SDKを悪用することで、マルウ
@nakajimeeee
22 Aug 2025
382 Impressions
0 Retweets
4 Likes
0 Bookmarks
0 Replies
0 Quotes
A campaign starting in March 2025 exploits CVE-2024-36401, misusing software development kits (SDKs) to earn passive income. We recount the campaign’s shifts over time: https://t.co/eZEPBtNIZw https://t.co/745JJsvty6
@Unit42_Intel
21 Aug 2025
4344 Impressions
21 Retweets
39 Likes
5 Bookmarks
0 Replies
0 Quotes
GeoServer 远程代码执行漏洞 CVE-2024-36401 POC,在GeoServer中,未登录的任意用户可以通过构造恶意OGC请求,在默认安装的服务器中执行XPath表达式, 黑客数据 渗透各大网址app 拿站 远控 提权 dns劫持 脱裤 入侵 端口ddos
@SHAZHON
7 Aug 2025
1151 Impressions
0 Retweets
12 Likes
0 Bookmarks
0 Replies
0 Quotes
GeoServer 远程代码执行漏洞 CVE-2024-36401 POC,在GeoServer中,未登录的任意用户可以通过构造恶意OGC请求,在默认安装的服务器中执行XPath表达式, 黑客数据 渗透各大网址app 拿站 远控 提权 dns劫持 脱裤 入侵 端口ddos
@SHAZHON
4 Aug 2025
1351 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
GeoServer の RCE 脆弱性 CVE-2024-36401 を悪用:CoinMiner をデプロする脅威アクター #宇宙セキュリティ #宇宙 #セキュリティ #security #space #spacesecurity https://t.co/FZ7wYoZJ1y
@SpaceCyberSec
28 Jul 2025
18 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
How long before n-day exploits become the new normal for crypto miners? - Linuxsys miner uses Apache 2.4.49 flaw (CVSS 7.5) to run stealthy shell scripts - Attackers hijack legit sites with valid SSL to evade detection - Campaign exploits CVE-2024-36401 & Atlassian Confluenc
@CuriousCatsAI
17 Jul 2025
60 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
A critical RCE vulnerability (CVE-2024-36401) in GeoServer puts systems at risk. Attackers can exploit unpatched versions of GeoServer via crafted requests. Learn more about the exploit and how OPSWAT solutions help mitigate exposure to this critical security risk. Read the htt
@OPSWAT
20 Mar 2025
70 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Recent vulnerability breakdowns include Androxgh0st Botnet Vulnerabilities, CVE-2024-36401 in GeoServer, and CVE-2023-1389 in TP-Link Archer AX21 Firmware. Providing detailed analysis to aid in understanding and mitigation.
@agentwhitehat
12 Jan 2025
5 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-36401: Critical Vulnerability in GeoServer Allows RCE by Unauthenticated Users #unauthenticatedrce #rce #geoserverexploit #cve_2024_36401 #geoserver_rce https://t.co/Cm596jQFrc
@_havij
31 Dec 2024
18 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
I made a nice shodan dork for CVE-2024-36401 shodan dork: http.html:"/ geoserver" http.title: "Geoserver" Valhalla 2.8 is private, but you can use the older version that's on github. #hacker #hackers #hacking #cybersecurity #programming #programmer #python #python3 https://t.co/C
@Zeddhacks
10 Dec 2024
7 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
İ made a nice shodan dork for CVE-2024-36401 shodan dork: http.html:"/ geoserver" http.title: "Geoserver" Valhalla 2.8 is private, but you can use the older version that's on github. https://t.co/dJCQ21MXfB
@yunus_huse99988
29 Nov 2024
14 Impressions
1 Retweet
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Top 5 Trending Security Vulnerabilities to Watch Out For: CVE-2024-44175 CVE-2024-37397 CVE-2024-7591 CVE-2024-36401 #infosec
@UAFnUg
28 Nov 2024
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-36401 GeoServer RCE poc https://t.co/j6su9PA2BM
@turne85540
28 Nov 2024
35 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨CVE-2024-36401 GeoServer Remote Code Execution PoC https://t.co/ruPbIoz4R6
@DarkWebInformer
27 Nov 2024
3636 Impressions
9 Retweets
26 Likes
8 Bookmarks
3 Replies
0 Quotes
Our experts regularly update Core Impact's certified #exploit library. Get details on the latest additions, including CVE-2024-6769, CVE-2024-36401, CVE-2024-47176, CVE-2024-38054, CVE-2024-26230, CVE-2024-0799, CVE-2024-0800, and more. https://t.co/DziZgG9ccw https://t.co/gveK7y
@CoreSecurity
11 Nov 2024
401 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
The CVE-2024-36401 vulnerability allows for Remote Code Execution with a CVSS score of 9.8, making it a significant risk for critical infrastructure. Earth Baxia is leveraging spear-phishing tactics to infiltrate systems and deploy advanced malware. https://t.co/iMaowb5MJp
@Shift6Security
4 Nov 2024
54 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-36401: GeoServer unauthenticated arbitrary code execution via XPath expression evaluation. Reported to government and space agencies over 4 months ago, yet many of them are still unpatched and exploitable with public PoC. Details and credits: https://t.co/zoiVfDguOW ht
@win3zz
3 Nov 2024
5580 Impressions
33 Retweets
116 Likes
69 Bookmarks
2 Replies
0 Quotes
El actor de amenazas Earth Baxia está explotando CVE-2024-36401, una vulnerabilidad de GeoServer, para lanzar ataques avanzados en países de APAC. Usan este exploit de ejecución remota de código para infiltrarse en los sistemas. Conoce más: https://t.co/2wrix6Hg9s https://t.co/6I
@TrendMicroES
29 Oct 2024
3 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
El actor de amenazas Earth Baxia está explotando CVE-2024-36401, una vulnerabilidad de GeoServer, para lanzar ataques avanzados en países de APAC. Utiliza este exploit de ejecución remota de código para infiltrarse en los sistemas. https://t.co/aYFeQbdO5O
@TrendMicroES
21 Oct 2024
26 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "BE0EE582-FAE7-4528-9A5E-6E56EB1DE345",
"versionEndExcluding": "2.22.6"
},
{
"criteria": "cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0069EB0E-BF96-47F5-8A02-13F9FA6C15D8",
"versionEndExcluding": "2.23.6",
"versionStartIncluding": "2.23.0"
},
{
"criteria": "cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6A407E94-A7F2-4A4F-B96E-2B3DC8FF6DF3",
"versionEndExcluding": "2.24.4",
"versionStartIncluding": "2.24.0"
},
{
"criteria": "cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "CFBAEC7A-6250-45FE-AB54-30D72C03F62D",
"versionEndExcluding": "2.25.2",
"versionStartIncluding": "2.25.0"
},
{
"criteria": "cpe:2.3:a:geotools:geotools:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "732DE428-3515-459F-AE5F-08407BA1A049",
"versionEndExcluding": "29.6"
},
{
"criteria": "cpe:2.3:a:geotools:geotools:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "5E338785-9877-4731-B095-E40C86D89577",
"versionEndExcluding": "30.4",
"versionStartIncluding": "30.1"
},
{
"criteria": "cpe:2.3:a:geotools:geotools:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "956C1035-1771-4DBE-9B23-815DB6ECB8BF",
"versionEndExcluding": "31.2",
"versionStartIncluding": "31.1"
},
{
"criteria": "cpe:2.3:a:geotools:geotools:30.0:-:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "CCE433A3-886D-4CBB-9696-660F517FBFEE"
},
{
"criteria": "cpe:2.3:a:geotools:geotools:30.0:rc:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "CEB40BCD-6D65-4DC8-A0BF-F5736D543B59"
},
{
"criteria": "cpe:2.3:a:geotools:geotools:31.0:-:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "75B1DF89-EFC1-4F5A-881E-495AE00E820B"
},
{
"criteria": "cpe:2.3:a:geotools:geotools:31.0:rc:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "72752A30-52B9-4E95-90F8-A807618B5313"
}
],
"operator": "OR"
}
]
}
]