Apache Geode: CSRF attacks through GET requests to the Management and Monitoring REST API that can execute gfsh commands on the target system
Description
Apache Geode is vulnerable to CSRF attacks through GET requests to the Management and Monitoring REST API that could allow an attacker who has tricked a user into giving up their Geode session credentials to submit malicious commands on the target system on behalf of the authenticated user.
This issue affects Apache Geode: versions 1.10 through 1.15.1
Users are recommended to upgrade to version 1.15.2, which fixes the issue.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A CSRF vulnerability in Apache Geode's Management and Monitoring REST API allows an attacker to execute gfsh commands on behalf of an authenticated user via GET requests.
Vulnerability
Description
CVE-2025-47410 is a Cross-Site Request Forgery (CSRF) vulnerability in the Management and Monitoring REST API of Apache Geode. The root cause is that the /management/commands endpoint accepted both GET and POST requests [3][4]. This allowed an attacker to craft a malicious GET request that, when clicked by an authenticated user, would execute arbitrary gfsh commands on the target Geode system using the user's session credentials [2][3].
Attack
Vector and Prerequisites
The attack requires tricking an authenticated Geode user into following a crafted link or visiting a malicious page that issues a GET request to the vulnerable endpoint [1][3]. No additional authentication is needed beyond the victim's existing session; the attacker does not need direct network access to the Geode cluster if the user's browser can reach the Management and Monitoring REST API [1]. The vulnerability affects Apache Geode versions 1.10 through 1.15.1 [2][3].
Impact
Successful exploitation allows an attacker to execute any gfsh command that the victim has permission to run, including operations that could modify cluster configuration, delete data, or create new regions [3][4]. The impact is limited by the privileges of the user whose session is hijacked, but an attacker gaining access to an administrative session could achieve full compromise of the Geode cluster [1][2].
Mitigation
The fix is in Apache Geode version 1.15.2, which disallows GET requests to the /management/commands endpoint by changing the @RequestMapping to accept only POST requests [4]. Users should upgrade to version 1.15.2 or apply the equivalent code change [2][3]. No workaround is documented for earlier versions.
- GitHub - apache/geode: Apache Geode
- NVD - CVE-2025-47410
- security - CVE-2025-47410: Apache Geode: CSRF attacks through GET requests to the Management and Monitoring REST API that can execute gfsh commands on the target system
- Disallow GET requests to /management/commands endpoint (#7910) · apache/geode@5709909
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.geode:geode-webMaven | >= 1.10.0, < 1.15.2 | 1.15.2 |
Affected products
2- Apache Software Foundation/Apache Geodev5Range: 1.10.0
Patches
1570990909e6fDisallow GET requests to /management/commands endpoint (#7910)
1 file changed · +1 −1
geode-web/src/main/java/org/apache/geode/management/internal/web/controllers/ShellCommandsController.java+1 −1 modified@@ -79,7 +79,7 @@ public class ShellCommandsController extends AbstractCommandsController { private static final String DEFAULT_INDEX_TYPE = "range"; - @RequestMapping(method = {RequestMethod.GET, RequestMethod.POST}, value = "/management/commands") + @RequestMapping(method = {RequestMethod.POST}, value = "/management/commands") public ResponseEntity<InputStreamResource> command(@RequestParam(value = "cmd") String command, @RequestParam(value = "resources", required = false) MultipartFile[] fileResource) throws IOException {
Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- github.com/advisories/GHSA-gjp8-99fv-cgcwghsaADVISORY
- lists.apache.org/thread/k88tv3rhl4ymsvt4h6qsv7sq10q5prrtghsavendor-advisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2025-47410ghsaADVISORY
- www.openwall.com/lists/oss-security/2025/10/17/2ghsaWEB
- github.com/apache/geode/commit/570990909e6fd1e491f01471ad30ee3c2dbff72cghsaWEB
News mentions
0No linked articles in our index yet.