Medium severity6.1NVD Advisory· Published May 8, 2026· Updated May 14, 2026
CVE-2026-42030
CVE-2026-42030
Description
MapServer is a system for developing web-based GIS applications. From version 6.0 to before version 8.6.2, a reflected XSS vulnerability in MapServer's WMS server allows an unauthenticated attacker to inject arbitrary HTML/JavaScript into the browser of any user who opens a crafted WMS URL. The vulnerability is triggered via FORMAT=application/openlayers combined with an unsanitized SRS parameter in WMS 1.3.0 requests. This issue has been patched in version 8.6.2.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/MapServer/MapServer/security/advisories/GHSA-4g9f-ph64-hg2xnvdExploitVendor Advisory
- github.com/MapServer/MapServer/releases/tag/rel-8-6-2nvdProductRelease Notes
News mentions
0No linked articles in our index yet.