CVE-2022-24816

OSGeo JAI-EXT — OSGeo GeoServer JAI-EXT Code Injection Vulnerability
🔥 CVSS 3.1  10 / 10 — CRITICAL 🔴 CISA Known Exploited Vulnerability

Overview

OSGeo GeoServer JAI-EXT contains a code injection vulnerability that, when programs use jt-jiffle and allow Jiffle script to be provided via network request, could allow remote code execution.

This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. The patched JAI-EXT is version 1.1.22: https://github.com/geosolutions-it/jai-ext/releases/tag/1.1.22, https://github.com/geosolutions-it/jai-ext/security/advisories/GHSA-v92f-jx6p-73rx; https://nvd.nist.gov/vuln/detail/CVE-2022-24816

Key Details

PropertyValue
CVE ID CVE-2022-24816
Vendor / Product OSGeo — JAI-EXT
NVD Published2022-04-13
NVD Last Modified2025-10-24
CVSS 3.1 Score10
CVSS 3.1 VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
SeverityCRITICAL
CWE CWE-94
CISA KEV Added2024-06-26
CISA KEV Deadline2024-07-17
Known Ransomware Use No

CVSS 3.1 Breakdown

Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Required Action

CISA BOD 22-01 Deadline: 2024-07-17. Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Timeline

DateEvent
2024-06-26Added to CISA Known Exploited Vulnerabilities catalog
2024-07-17CISA BOD 22-01 remediation deadline

References

ResourceType
NVD — CVE-2022-24816 Vulnerability Database
CISA KEV Catalog Entry US Government