CVE-2025-44136
Published: 29 July 2025
Summary
CVE-2025-44136 is a critical-severity Cross-site Scripting (CWE-79) vulnerability in Maptiler Tileserver Php. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 5.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-11 (Error Handling) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-15 requires filtering of information output to prevent injection of malicious scripts like XSS payloads reflected in error messages.
SI-11 mandates secure error handling to avoid reflecting unencoded user input such as the 'layer' parameter in error messages, directly mitigating this XSS vulnerability.
SI-10 enforces input validation on parameters like 'layer' to reject or sanitize malicious payloads before they reach the error message reflection point.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Reflected XSS in unauthenticated public-facing web parameter directly enables remote exploitation of the application via crafted requests.
NVD Description
MapTiler Tileserver-php v2.0 is vulnerable to Cross Site Scripting (XSS). The GET parameter "layer" is reflected in an error message without html encoding. This leads to XSS and allows an unauthenticated attacker to execute arbitrary HTML or JavaScript code on…
more
a victim's browser.
Deeper analysisAI
MapTiler Tileserver-php version 2.0 is affected by CVE-2025-44136, a cross-site scripting (XSS) vulnerability classified under CWE-79 with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The flaw occurs because the "layer" GET parameter is reflected in an error message without HTML encoding, enabling the injection of malicious scripts.
Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no privileges or user interaction required. Exploitation allows attackers to execute arbitrary HTML or JavaScript code in the victim's browser, compromising confidentiality, integrity, and availability to a high degree.
Mitigation details and further discussion are available in the project's GitHub issue tracker at https://github.com/maptiler/tileserver-php/issues/167 and a related proof-of-concept repository at https://github.com/mheranco/CVE-2025-44136.
Details
- CWE(s)