CVE-2025-44137

MapTiler · MapTiler Multiple Products

A high-severity vulnerability has been discovered in MapTiler Tileserver-php, a software used for serving map data.

Executive summary

A high-severity vulnerability has been discovered in MapTiler Tileserver-php, a software used for serving map data. This flaw could allow a remote attacker to execute malicious code on the server without needing any credentials, potentially leading to a full system compromise. Successful exploitation could result in data theft, service outages, and further attacks on the organization's network.

Vulnerability

The vulnerability exists within the MapTiler Tileserver-php v2 application due to improper sanitization of user-supplied input in a core API endpoint. An unauthenticated remote attacker can craft a specially designed HTTP request containing malicious, URL-encoded commands. The application fails to validate this input before passing it to a system shell function, resulting in Remote Code Execution (RCE) with the privileges of the web server user.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.2. Successful exploitation could have a significant business impact, including the compromise of sensitive geospatial data, customer information, or proprietary intellectual property hosted on the server. An attacker could deface the mapping service, causing service disruption and reputational damage, or use the compromised server as a foothold to launch further attacks against the internal network. The potential for a complete system takeover presents a critical risk to data confidentiality, integrity, and availability.

Remediation

Immediate Action: The primary and most effective remediation is to apply the security updates provided by MapTiler immediately across all affected systems. After patching, it is crucial to review web server and application access logs for any signs of compromise that may have occurred prior to the update.

Proactive Monitoring: Continuously monitor web server (e.g., Apache, Nginx) access and error logs for unusual or malformed requests, particularly those containing encoded strings or shell commands. Implement network intrusion detection/prevention systems (IDS/IPS) to look for signatures associated with this exploit. Monitor server process lists for unexpected commands or scripts being executed by the web server's user account (e.g., www-data, apache).

Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with rules designed to block requests containing suspicious patterns and special characters. Restrict network access to the server's management and API endpoints, allowing connections only from trusted IP addresses. Harden the server environment by running the web service with the lowest possible user privileges.

Exploitation status

Public Exploit Available: False

Analyst recommendation

Given the high severity (CVSS 8.2) of this remote code execution vulnerability, we strongly recommend that all organizations using the affected MapTiler software prioritize the immediate application of vendor-supplied patches. While this vulnerability is not yet on the CISA KEV list and no public exploits are currently available, the risk of future exploitation is significant. A successful attack could lead to a complete compromise of the affected server, resulting in data breaches and operational disruption. Proactive patching is the most effective defense against this critical threat.