Apache Batik 1.13 is vulnerable to server-side request forgery, caused by improper input validation by the NodePickerPanel. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.

Project Subscriptions

Vendors Products
Debian Linux Subscribe
Fedoraproject Subscribe
Agile Engineering Data Management Subscribe
Banking Apis Subscribe
Banking Digital Experience Subscribe
Communications Application Session Controller Subscribe
Communications Metasolv Solution Subscribe
Communications Offline Mediation Controller Subscribe
Enterprise Repository Subscribe
Flexcube Universal Banking Subscribe
Fusion Middleware Mapviewer Subscribe
Instantis Enterprisetrack Subscribe
Insurance Policy Administration Subscribe
Product Lifecycle Analytics Subscribe
Retail Back Office Subscribe
Retail Central Office Subscribe
Retail Order Broker Subscribe
Retail Order Management System Cloud Service Subscribe
Retail Point-of-service Subscribe
Retail Returns Management Subscribe
Weblogic Server Subscribe
Jboss Fuse Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3619-1 batik security update
Debian DLA Debian DLA DLA-4243-1 batik security update
Github GHSA Github GHSA GHSA-2h63-qp69-fwvw Server-side request forgery (SSRF) in Apache Batik
Ubuntu USN Ubuntu USN USN-6117-1 Apache Batik vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 03 Nov 2025 20:30:00 +0000

Type Values Removed Values Added
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2025-11-03T19:25:28.147Z

Reserved: 2020-04-21T00:00:00.000Z

Link: CVE-2020-11987

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-02-24T18:15:11.093

Modified: 2025-11-03T20:15:42.737

Link: CVE-2020-11987

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-02-24T00:00:00Z

Links: CVE-2020-11987 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses