{"id":"CVE-2025-47410","details":"Apache Geode is vulnerable to CSRF attacks through GET requests to the Management and Monitoring REST API that could allow an attacker who has tricked a user into giving up their Geode session credentials to submit malicious commands on the target system on behalf of the authenticated user.\n\n\nThis issue affects Apache Geode: versions 1.10 through 1.15.1\n\nUsers are recommended to upgrade to version 1.15.2, which fixes the issue.","aliases":["GHSA-gjp8-99fv-cgcw"],"modified":"2026-04-10T05:28:46.279329Z","published":"2025-10-18T16:15:35.557Z","references":[{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2025/10/17/2"},{"type":"ADVISORY","url":"https://lists.apache.org/thread/k88tv3rhl4ymsvt4h6qsv7sq10q5prrt"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/geode","events":[{"introduced":"0c539fd5110b7f4d432b0308725701ed0009cd0f"},{"fixed":"b9feb9a3689469096c5258e163880d10743e638b"}],"database_specific":{"versions":[{"introduced":"1.10.0"},{"fixed":"1.15.2"}]}}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-47410.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}