CVE-2025-47410

📊 8.8 HIGH0.0%🎯 0 exploits
📅 Published Oct 18, 2025
📋 Status: Analyzed

Apache Geode is vulnerable to CSRF attacks through GET requests to the Management and Monitoring REST API that could allow an attacker who has tricked a user into giving up their Geode session credentials to submit malicious commands on the target system on behalf of the authenticated user. This issue affects Apache Geode: versions 1.10 through 1.15.1 Users are recommended to upgrade to version 1.15.2, which fixes the issue.

🎯 Affected Products & Systems

1 product configurations affected

Filter by type:
📱
Application
Vulnerable
Version: ≥ 1.10.0 ∧ < 1.15.2
CPE:
cpe:2.3:a:apache:geode:*:*:*:*:*:*:*:*
Metrics
8.8 HIGHCVSS v3.1134c704f-9b21-4f2e-91b3-4a467353bcc0
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector:
NETWORK
Complexity:
LOW
Privileges:
NONE
User Interaction:
REQUIRED
Confidentiality:
HIGH
Integrity:
HIGH
Availability:
HIGH
Scope:
UNCHANGED

🔍 Technical Details

Analysis Status
Analyzed
CVSS Details
8.8 (HIGH)v3.1
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
EPSS Details
0.0% (Minimal)1.8th percentile
Last updated: Oct 31, 2025
Exploitation probability within 30 days
Published Date
Oct 18, 2025 (15 days ago)
Last Modified
Oct 28, 2025 (5 days ago)
Security Weaknesses1
References2