Overview
OSGeo GeoServer JAI-EXT contains a code injection vulnerability that, when programs use jt-jiffle and allow Jiffle script to be provided via network request, could allow remote code execution.
This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. The patched JAI-EXT is version 1.1.22: https://github.com/geosolutions-it/jai-ext/releases/tag/1.1.22, https://github.com/geosolutions-it/jai-ext/security/advisories/GHSA-v92f-jx6p-73rx; https://nvd.nist.gov/vuln/detail/CVE-2022-24816
Key Details
| Property | Value |
|---|---|
| CVE ID | CVE-2022-24816 |
| Vendor / Product | OSGeo — JAI-EXT |
| NVD Published | 2022-04-13 |
| NVD Last Modified | 2025-10-24 |
| CVSS 3.1 Score | 10 |
| CVSS 3.1 Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
| Severity | CRITICAL |
| CWE | CWE-94 |
| CISA KEV Added | 2024-06-26 |
| CISA KEV Deadline | 2024-07-17 |
| Known Ransomware Use | No |
CVSS 3.1 Breakdown
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Required Action
CISA BOD 22-01 Deadline: 2024-07-17.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Timeline
| Date | Event |
|---|---|
| 2024-06-26 | Added to CISA Known Exploited Vulnerabilities catalog |
| 2024-07-17 | CISA BOD 22-01 remediation deadline |
References
| Resource | Type |
|---|---|
| NVD — CVE-2022-24816 | Vulnerability Database |
| CISA KEV Catalog Entry | US Government |