Loading
GeoServer 2, in some configurations, allows remote attackers to execute arbitrary code via java.lang.Runtime.getRuntime().exec in wps:LiteralData within a wps:Execute request, as exploited in the wild in June 2023. NOTE: the vendor states that they are unable to reproduce this in any version.
Use Geoserver vendor hub and Geoserver product page to widen CVE-2023-35042 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2024-36401, CVE-2025-58360 and CVE-2024-24749 for nearby disclosures in the same product family.