Company Details
osgeo
41
6,232
None
osgeo.org
15
OSG_2213231
Completed

OSGeo Company CyberSecurity Posture
osgeo.orgThe Open Source Geospatial Foundation (OSGeo) is a not-for-profit organization whose mission is to foster global adoption of open geospatial technology by being an inclusive software foundation devoted to an open philosophy and participatory community driven development. The foundation provides financial, organizational and legal support to the broader open source geospatial community. It also serves as an independent legal entity to which community members can contribute code, funding and other resources, secure in the knowledge that their contributions will be maintained for public benefit. OSGeo also serves as an outreach and advocacy organization for the open source geospatial community, and provides a common forum and shared infrastructure for improving cross-project collaboration. The foundation’s projects are all freely available and useable under an Open Source Initiative certified open source license. OSGeo has US 501(c)(4) legal status as a not-for-profit organization.
Company Details
osgeo
41
6,232
None
osgeo.org
15
OSG_2213231
Completed
Between 750 and 799

OSGeo Global Score (TPRM)XXXX

Description: The exploitation of the GeoServer GeoTools flaw designated as CVE-2024-36401 by multiple threat actors resulted in the distribution of various malware, including cryptocurrency miners, bots, and advanced backdoors such as SideWalk, which is linked to the APT41 cyberespionage group. Impacting diverse entities such as IT services in India, technology firms in the US, government operations in Belgium, and telecoms in Thailand and Brazil, the breach allowed for unauthorized remote access, data exfiltration, and additional payload deployment. The wide geographical distribution of the attacks underlines the sophisticated and far-reaching nature of the campaign that capitalized on this vulnerability.


No incidents recorded for OSGeo in 2025.
No incidents recorded for OSGeo in 2025.
No incidents recorded for OSGeo in 2025.
OSGeo cyber incidents detection timeline including parent company and subsidiaries

The Open Source Geospatial Foundation (OSGeo) is a not-for-profit organization whose mission is to foster global adoption of open geospatial technology by being an inclusive software foundation devoted to an open philosophy and participatory community driven development. The foundation provides financial, organizational and legal support to the broader open source geospatial community. It also serves as an independent legal entity to which community members can contribute code, funding and other resources, secure in the knowledge that their contributions will be maintained for public benefit. OSGeo also serves as an outreach and advocacy organization for the open source geospatial community, and provides a common forum and shared infrastructure for improving cross-project collaboration. The foundation’s projects are all freely available and useable under an Open Source Initiative certified open source license. OSGeo has US 501(c)(4) legal status as a not-for-profit organization.

AKKA is a European leader in engineering consulting and R&D services. Our comprehensive portfolio of digital solutions combined with our expertise in engineering, uniquely positions us to support our clients by leveraging the power of connected data to accelerate innovation and drive the future of s

Computacenter is a leading independent technology and services provider, trusted by large corporate and public sector organisations. We are a responsible business that believes in winning together for our people and our planet. We help our customers to Source, Transform and Manage their technol

A Fujitsu é a companhia líder japonesa de tecnologias de informação e comunicação (TIC) disponibilizando um leque completo de produtos tecnológicos, soluções e serviços. Cerca de 132.000 colaboradores da Fujitsu prestam suporte a clientes em mais de 100 países. Utilizamos a nossa experiência e o pod
Thoughtworks is a pioneering global technology consultancy, leading the charge in custom software development and technology innovation. We empower ambitious businesses to thrive in a constantly evolving world. We integrate the best of strategy, design, and software engineering to provide our client
Exela is a business process automation (BPA) leader, leveraging a global footprint and proprietary technology to provide digital transformation solutions enhancing quality, productivity, and end-user experience. With decades of expertise operating mission-critical processes, Exela serves a growing

In a world undergoing constant change, VINCI Energies contributes to the environmental transition by helping bring about major trends in the digital landscape and energy sector. VINCI Energies’ teams roll out technologies and integrate customised multi-technical solutions, from design to implement

We are at the forefront of digital transformation in the Americas, positively impacting the lives of over 500 million people. As a key player in emerging industries, we drive innovation and change through ambitious modernization projects and cutting-edge solutions. By understanding the region's chal
.png)
The GeoServer Gambit: Hackers Exploit Mapping Software's Hidden Weakness in Latest Cyber Onslaught. In the ever-evolving arena of...
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds an OSGeo GeoServer flaw to its Known Exploited Vulnerabilities catalog.
CISA has issued an urgent warning about a critical flaw in OSGeo GeoServer, a popular open-source tool used to share geographic data.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity security flaw impacting OSGeo GeoServer...
A critical vulnerability in the Salesforce CLI installer (sf-x64.exe) enables attackers to achieve arbitrary code execution,...
Cybersecurity researchers are calling attention to multiple campaigns that are taking advantage of known security vulnerabilities and...
Cybersecurity researchers have discovered a new campaign that employs a previously undocumented ransomware family called Charon to target...
A major security flaw affecting millions of Bluetooth headphones and earbuds has been discovered, allowing attackers to remotely hijack...
A suspected advanced persistent threat (APT) originating from China targeted a government organization in Taiwan, and possibly other countries in the Asia-...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of OSGeo is https://www.osgeo.org.
According to Rankiteo, OSGeo’s AI-generated cybersecurity score is 751, reflecting their Fair security posture.
According to Rankiteo, OSGeo currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, OSGeo is not certified under SOC 2 Type 1.
According to Rankiteo, OSGeo does not hold a SOC 2 Type 2 certification.
According to Rankiteo, OSGeo is not listed as GDPR compliant.
According to Rankiteo, OSGeo does not currently maintain PCI DSS compliance.
According to Rankiteo, OSGeo is not compliant with HIPAA regulations.
According to Rankiteo,OSGeo is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
OSGeo operates primarily in the Information Technology & Services industry.
OSGeo employs approximately 41 people worldwide.
OSGeo presently has no subsidiaries across any sectors.
OSGeo’s official LinkedIn profile has approximately 6,232 followers.
OSGeo is classified under the NAICS code None, which corresponds to Others.
No, OSGeo does not have a profile on Crunchbase.
Yes, OSGeo maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/osgeo.
As of December 24, 2025, Rankiteo reports that OSGeo has experienced 1 cybersecurity incidents.
OSGeo has an estimated 10,386 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability.
Title: GeoServer GeoTools Exploitation (CVE-2024-36401)
Description: The exploitation of the GeoServer GeoTools flaw designated as CVE-2024-36401 by multiple threat actors resulted in the distribution of various malware, including cryptocurrency miners, bots, and advanced backdoors such as SideWalk, which is linked to the APT41 cyberespionage group. Impacting diverse entities such as IT services in India, technology firms in the US, government operations in Belgium, and telecoms in Thailand and Brazil, the breach allowed for unauthorized remote access, data exfiltration, and additional payload deployment. The wide geographical distribution of the attacks underlines the sophisticated and far-reaching nature of the campaign that capitalized on this vulnerability.
Type: Malware Distribution and Data Exfiltration
Attack Vector: Exploitation of CVE-2024-36401
Vulnerability Exploited: CVE-2024-36401
Threat Actor: Multiple Threat ActorsAPT41
Motivation: CyberespionageFinancial Gain
Common Attack Types: The most common types of attacks the company has faced is Vulnerability.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through CVE-2024-36401.

Entity Type: IT Services
Industry: Technology
Location: India

Entity Type: Technology Firms
Industry: Technology
Location: US

Entity Type: Government Operations
Industry: Government
Location: Belgium

Entity Type: Telecoms
Industry: Telecommunications
Location: ThailandBrazil


Entry Point: CVE-2024-36401
Backdoors Established: True

Root Causes: Vulnerability in GeoServer GeoTools
Last Attacking Group: The attacking group in the last incident was an Multiple Threat ActorsAPT41.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an CVE-2024-36401.
.png)
httparty is an API tool. In versions 0.23.2 and prior, httparty is vulnerable to SSRF. This issue can pose a risk of leaking API keys, and it can also allow third parties to issue requests to internal servers. This issue has been patched via commit 0529bcd.
5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. In versions 0.15.2 and prior, an RCE vulnerability exists in useMarkdown.ts, where the markdown-it-mermaid plugin is initialized with securityLevel: 'loose'. This configuration explicitly permits the rendering of HTML tags within Mermaid diagram nodes. This issue has not been patched at time of publication.
continuwuity is a Matrix homeserver written in Rust. Prior to version 0.5.0, this vulnerability allows a remote, unauthenticated attacker to force the target server to cryptographically sign arbitrary membership events. The flaw exists because the server fails to validate the origin of a signing request, provided the event's state_key is a valid user ID belonging to the target server. This issue has been patched in version 0.5.0. A workaround for this issue involves blocking access to the PUT /_matrix/federation/v2/invite/{roomId}/{eventId} endpoint using the reverse proxy.
LangChain is a framework for building LLM-powered applications. Prior to @langchain/core versions 0.3.80 and 1.1.8, and prior to langchain versions 0.3.37 and 1.2.3, a serialization injection vulnerability exists in LangChain JS's toJSON() method (and subsequently when string-ifying objects using JSON.stringify(). The method did not escape objects with 'lc' keys when serializing free-form data in kwargs. The 'lc' key is used internally by LangChain to mark serialized objects. When user-controlled data contains this key structure, it is treated as a legitimate LangChain object during deserialization rather than plain user data. This issue has been patched in @langchain/core versions 0.3.80 and 1.1.8, and langchain versions 0.3.37 and 1.2.3
LangChain is a framework for building agents and LLM-powered applications. Prior to versions 0.3.81 and 1.2.5, a serialization injection vulnerability exists in LangChain's dumps() and dumpd() functions. The functions do not escape dictionaries with 'lc' keys when serializing free-form dictionaries. The 'lc' key is used internally by LangChain to mark serialized objects. When user-controlled data contains this key structure, it is treated as a legitimate LangChain object during deserialization rather than plain user data. This issue has been patched in versions 0.3.81 and 1.2.5.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.