CVE-2024-25700: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri ArcGIS Enterprise Builder
There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Web App Builder versions 11.1 and below that may allow a remote, authenticated attacker to create a crafted link that is stored in a web map link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high.
AI Analysis
Technical Summary
CVE-2024-25700 is a stored Cross-site Scripting (XSS) vulnerability identified in Esri Portal for ArcGIS Enterprise Web App Builder versions 11.1 and below. This vulnerability arises due to improper neutralization of input during web page generation (CWE-79). Specifically, an authenticated attacker with high privileges can craft a malicious link embedded within a web map link. When a victim clicks this link, arbitrary JavaScript code can execute in the victim's browser context. This stored XSS flaw allows the injected script to persist within the application, potentially affecting multiple users who access the compromised web map. The attack requires the attacker to have high-level privileges and user interaction (clicking the crafted link). The CVSS v3.1 base score is 4.8 (medium severity), reflecting network attack vector, low attack complexity, high privileges required, user interaction needed, and impact limited to confidentiality and integrity with no availability impact. The vulnerability affects all versions up to 11.1 of the Esri ArcGIS Enterprise Builder product. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is significant because ArcGIS Enterprise is widely used for geographic information system (GIS) applications, often in critical infrastructure, government, and enterprise environments, where unauthorized script execution could lead to data leakage, session hijacking, or further exploitation within the trusted network environment.
Potential Impact
For European organizations, especially those in government, urban planning, utilities, transportation, and environmental sectors that rely heavily on Esri ArcGIS Enterprise for spatial data management and visualization, this vulnerability poses a risk of unauthorized data exposure and manipulation. Exploitation could allow attackers to execute malicious scripts that steal session tokens, perform unauthorized actions on behalf of users, or redirect users to malicious sites. Given the high privileges required, the threat is more likely from insider threats or compromised privileged accounts. The stored nature of the XSS means multiple users could be affected once the malicious link is embedded. This could undermine trust in critical GIS applications, disrupt operations, and potentially expose sensitive geospatial data. The medium severity score suggests moderate risk, but the strategic importance of GIS data in Europe elevates the potential impact. Additionally, the cross-site scripting could be leveraged as a pivot point for further attacks within the network, especially in environments where ArcGIS is integrated with other enterprise systems.
Mitigation Recommendations
1. Restrict and monitor high-privilege account usage rigorously, ensuring that only trusted personnel have access to create or modify web map links. 2. Implement strict input validation and output encoding on all user-supplied data within the ArcGIS Enterprise Web App Builder environment to neutralize malicious scripts. 3. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers accessing the GIS portal. 4. Conduct regular security audits and penetration testing focused on web application vulnerabilities, including stored XSS, within GIS platforms. 5. Educate users to be cautious when clicking on links within the GIS portal, especially those created or modified recently or by less trusted users. 6. Monitor logs for unusual activities related to web map link creation or modification. 7. Apply patches or updates from Esri as soon as they become available. 8. Consider deploying Web Application Firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting the ArcGIS Enterprise environment.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden, Poland, Finland
CVE-2024-25700: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri ArcGIS Enterprise Builder
Description
There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Web App Builder versions 11.1 and below that may allow a remote, authenticated attacker to create a crafted link that is stored in a web map link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high.
AI-Powered Analysis
Technical Analysis
CVE-2024-25700 is a stored Cross-site Scripting (XSS) vulnerability identified in Esri Portal for ArcGIS Enterprise Web App Builder versions 11.1 and below. This vulnerability arises due to improper neutralization of input during web page generation (CWE-79). Specifically, an authenticated attacker with high privileges can craft a malicious link embedded within a web map link. When a victim clicks this link, arbitrary JavaScript code can execute in the victim's browser context. This stored XSS flaw allows the injected script to persist within the application, potentially affecting multiple users who access the compromised web map. The attack requires the attacker to have high-level privileges and user interaction (clicking the crafted link). The CVSS v3.1 base score is 4.8 (medium severity), reflecting network attack vector, low attack complexity, high privileges required, user interaction needed, and impact limited to confidentiality and integrity with no availability impact. The vulnerability affects all versions up to 11.1 of the Esri ArcGIS Enterprise Builder product. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is significant because ArcGIS Enterprise is widely used for geographic information system (GIS) applications, often in critical infrastructure, government, and enterprise environments, where unauthorized script execution could lead to data leakage, session hijacking, or further exploitation within the trusted network environment.
Potential Impact
For European organizations, especially those in government, urban planning, utilities, transportation, and environmental sectors that rely heavily on Esri ArcGIS Enterprise for spatial data management and visualization, this vulnerability poses a risk of unauthorized data exposure and manipulation. Exploitation could allow attackers to execute malicious scripts that steal session tokens, perform unauthorized actions on behalf of users, or redirect users to malicious sites. Given the high privileges required, the threat is more likely from insider threats or compromised privileged accounts. The stored nature of the XSS means multiple users could be affected once the malicious link is embedded. This could undermine trust in critical GIS applications, disrupt operations, and potentially expose sensitive geospatial data. The medium severity score suggests moderate risk, but the strategic importance of GIS data in Europe elevates the potential impact. Additionally, the cross-site scripting could be leveraged as a pivot point for further attacks within the network, especially in environments where ArcGIS is integrated with other enterprise systems.
Mitigation Recommendations
1. Restrict and monitor high-privilege account usage rigorously, ensuring that only trusted personnel have access to create or modify web map links. 2. Implement strict input validation and output encoding on all user-supplied data within the ArcGIS Enterprise Web App Builder environment to neutralize malicious scripts. 3. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers accessing the GIS portal. 4. Conduct regular security audits and penetration testing focused on web application vulnerabilities, including stored XSS, within GIS platforms. 5. Educate users to be cautious when clicking on links within the GIS portal, especially those created or modified recently or by less trusted users. 6. Monitor logs for unusual activities related to web map link creation or modification. 7. Apply patches or updates from Esri as soon as they become available. 8. Consider deploying Web Application Firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting the ArcGIS Enterprise environment.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Esri
- Date Reserved
- 2024-02-09T19:08:35.887Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9816c4522896dcbd6d33
Added to database: 5/21/2025, 9:08:38 AM
Last enriched: 7/4/2025, 9:56:43 PM
Last updated: 7/27/2025, 4:33:11 AM
Views: 13
Related Threats
CVE-2025-7679: CWE-306 Missing Authentication for Critical Function in ABB Aspect
HighCVE-2025-7677: CWE-306 Missing Authentication for Critical Function in ABB Aspect
MediumCVE-2025-53191: CWE-306 Missing Authentication for Critical Function in ABB Aspect
HighCVE-2025-53190: CWE-286 in ABB Aspect
HighCVE-2025-53189: CWE-639 Authorization Bypass Through User-Controlled Key in ABB Aspect
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.