VYPR
High severityNVD Advisory· Published Oct 18, 2025· Updated Nov 4, 2025

Apache Geode: CSRF attacks through GET requests to the Management and Monitoring REST API that can execute gfsh commands on the target system

CVE-2025-47410

Description

Apache Geode is vulnerable to CSRF attacks through GET requests to the Management and Monitoring REST API that could allow an attacker who has tricked a user into giving up their Geode session credentials to submit malicious commands on the target system on behalf of the authenticated user.

This issue affects Apache Geode: versions 1.10 through 1.15.1

Users are recommended to upgrade to version 1.15.2, which fixes the issue.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A CSRF vulnerability in Apache Geode's Management and Monitoring REST API allows an attacker to execute gfsh commands on behalf of an authenticated user via GET requests.

Vulnerability

Description

CVE-2025-47410 is a Cross-Site Request Forgery (CSRF) vulnerability in the Management and Monitoring REST API of Apache Geode. The root cause is that the /management/commands endpoint accepted both GET and POST requests [3][4]. This allowed an attacker to craft a malicious GET request that, when clicked by an authenticated user, would execute arbitrary gfsh commands on the target Geode system using the user's session credentials [2][3].

Attack

Vector and Prerequisites

The attack requires tricking an authenticated Geode user into following a crafted link or visiting a malicious page that issues a GET request to the vulnerable endpoint [1][3]. No additional authentication is needed beyond the victim's existing session; the attacker does not need direct network access to the Geode cluster if the user's browser can reach the Management and Monitoring REST API [1]. The vulnerability affects Apache Geode versions 1.10 through 1.15.1 [2][3].

Impact

Successful exploitation allows an attacker to execute any gfsh command that the victim has permission to run, including operations that could modify cluster configuration, delete data, or create new regions [3][4]. The impact is limited by the privileges of the user whose session is hijacked, but an attacker gaining access to an administrative session could achieve full compromise of the Geode cluster [1][2].

Mitigation

The fix is in Apache Geode version 1.15.2, which disallows GET requests to the /management/commands endpoint by changing the @RequestMapping to accept only POST requests [4]. Users should upgrade to version 1.15.2 or apply the equivalent code change [2][3]. No workaround is documented for earlier versions.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.geode:geode-webMaven
>= 1.10.0, < 1.15.21.15.2

Affected products

2
  • Apache/Geodellm-fuzzy
    Range: >=1.10 <=1.15.1
  • Apache Software Foundation/Apache Geodev5
    Range: 1.10.0

Patches

1
570990909e6f

Disallow GET requests to /management/commands endpoint (#7910)

https://github.com/apache/geodewmh1108-sasAug 28, 2025via ghsa
1 file changed · +1 1
  • geode-web/src/main/java/org/apache/geode/management/internal/web/controllers/ShellCommandsController.java+1 1 modified
    @@ -79,7 +79,7 @@ public class ShellCommandsController extends AbstractCommandsController {
     
       private static final String DEFAULT_INDEX_TYPE = "range";
     
    -  @RequestMapping(method = {RequestMethod.GET, RequestMethod.POST}, value = "/management/commands")
    +  @RequestMapping(method = {RequestMethod.POST}, value = "/management/commands")
       public ResponseEntity<InputStreamResource> command(@RequestParam(value = "cmd") String command,
           @RequestParam(value = "resources", required = false) MultipartFile[] fileResource)
           throws IOException {
    

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

5

News mentions

0

No linked articles in our index yet.