CVE-2024-25705: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri Portal for ArcGIS
There is a cross site scripting vulnerability in the Esri Portal for ArcGIS Experience Builder 11.1 and below on Windows and Linux that allows a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are low.
AI Analysis
Technical Summary
CVE-2024-25705 is a cross-site scripting (XSS) vulnerability identified in Esri Portal for ArcGIS Experience Builder version 11.1 and earlier, affecting both Windows and Linux deployments. The vulnerability stems from improper neutralization of input during web page generation (CWE-79), allowing an attacker to inject malicious JavaScript code into web pages served by the portal. An unauthenticated remote attacker with low privileges can craft a specially designed URL that, when clicked by a victim, executes arbitrary JavaScript in the victim's browser context. This can lead to theft of session tokens, redirection to malicious sites, or execution of actions on behalf of the user within the portal environment. The vulnerability does not require the attacker to be authenticated, but user interaction (clicking the crafted link) is necessary for exploitation. The CVSS v3.1 base score is 5.4 (medium severity), reflecting network attack vector, low attack complexity, low privileges required, user interaction needed, and impact on confidentiality and integrity but no impact on availability. The vulnerability affects all versions up to and including 11.1, with no patch links currently provided. No known exploits are reported in the wild as of the publication date. Given the portal’s role in geographic information system (GIS) data sharing and collaboration, exploitation could compromise sensitive geospatial data or enable further attacks within an organization’s GIS infrastructure.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for entities relying on Esri Portal for ArcGIS for critical GIS data management, such as government agencies, urban planning departments, environmental monitoring bodies, and utilities. Successful exploitation could lead to unauthorized disclosure of sensitive geospatial information, manipulation of GIS data integrity, or session hijacking, potentially disrupting decision-making processes or exposing confidential infrastructure details. Since the vulnerability requires user interaction, phishing or social engineering campaigns could be used to trick employees into clicking malicious links. The cross-site scripting flaw could also be leveraged as a foothold for further attacks within the network, including lateral movement or deployment of malware. Given the widespread use of Esri products in Europe, particularly in public sector and infrastructure domains, the vulnerability poses a moderate risk to confidentiality and integrity of critical data assets.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Monitor Esri’s official channels for patches or updates addressing CVE-2024-25705 and apply them promptly once available. 2) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious input patterns or URLs targeting the portal’s web interface. 3) Conduct user awareness training focused on phishing and social engineering risks, emphasizing caution with unsolicited links related to GIS portals. 4) Restrict access to the Portal for ArcGIS Experience Builder interface to trusted networks or VPNs to reduce exposure to unauthenticated attackers. 5) Implement Content Security Policy (CSP) headers on the portal web server to limit the execution of unauthorized scripts. 6) Regularly audit portal logs for unusual access patterns or repeated failed attempts that may indicate exploitation attempts. 7) Use multi-factor authentication (MFA) for portal users to reduce the impact of session hijacking. 8) Segment GIS infrastructure from other critical systems to contain potential breaches.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden, Poland, Austria
CVE-2024-25705: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri Portal for ArcGIS
Description
There is a cross site scripting vulnerability in the Esri Portal for ArcGIS Experience Builder 11.1 and below on Windows and Linux that allows a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are low.
AI-Powered Analysis
Technical Analysis
CVE-2024-25705 is a cross-site scripting (XSS) vulnerability identified in Esri Portal for ArcGIS Experience Builder version 11.1 and earlier, affecting both Windows and Linux deployments. The vulnerability stems from improper neutralization of input during web page generation (CWE-79), allowing an attacker to inject malicious JavaScript code into web pages served by the portal. An unauthenticated remote attacker with low privileges can craft a specially designed URL that, when clicked by a victim, executes arbitrary JavaScript in the victim's browser context. This can lead to theft of session tokens, redirection to malicious sites, or execution of actions on behalf of the user within the portal environment. The vulnerability does not require the attacker to be authenticated, but user interaction (clicking the crafted link) is necessary for exploitation. The CVSS v3.1 base score is 5.4 (medium severity), reflecting network attack vector, low attack complexity, low privileges required, user interaction needed, and impact on confidentiality and integrity but no impact on availability. The vulnerability affects all versions up to and including 11.1, with no patch links currently provided. No known exploits are reported in the wild as of the publication date. Given the portal’s role in geographic information system (GIS) data sharing and collaboration, exploitation could compromise sensitive geospatial data or enable further attacks within an organization’s GIS infrastructure.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for entities relying on Esri Portal for ArcGIS for critical GIS data management, such as government agencies, urban planning departments, environmental monitoring bodies, and utilities. Successful exploitation could lead to unauthorized disclosure of sensitive geospatial information, manipulation of GIS data integrity, or session hijacking, potentially disrupting decision-making processes or exposing confidential infrastructure details. Since the vulnerability requires user interaction, phishing or social engineering campaigns could be used to trick employees into clicking malicious links. The cross-site scripting flaw could also be leveraged as a foothold for further attacks within the network, including lateral movement or deployment of malware. Given the widespread use of Esri products in Europe, particularly in public sector and infrastructure domains, the vulnerability poses a moderate risk to confidentiality and integrity of critical data assets.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Monitor Esri’s official channels for patches or updates addressing CVE-2024-25705 and apply them promptly once available. 2) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious input patterns or URLs targeting the portal’s web interface. 3) Conduct user awareness training focused on phishing and social engineering risks, emphasizing caution with unsolicited links related to GIS portals. 4) Restrict access to the Portal for ArcGIS Experience Builder interface to trusted networks or VPNs to reduce exposure to unauthenticated attackers. 5) Implement Content Security Policy (CSP) headers on the portal web server to limit the execution of unauthorized scripts. 6) Regularly audit portal logs for unusual access patterns or repeated failed attempts that may indicate exploitation attempts. 7) Use multi-factor authentication (MFA) for portal users to reduce the impact of session hijacking. 8) Segment GIS infrastructure from other critical systems to contain potential breaches.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Esri
- Date Reserved
- 2024-02-09T19:08:35.888Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9816c4522896dcbd6d54
Added to database: 5/21/2025, 9:08:38 AM
Last enriched: 7/4/2025, 9:56:58 PM
Last updated: 7/26/2025, 2:02:32 AM
Views: 13
Related Threats
CVE-2025-8866: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in YugabyteDB Inc YugabyteDB Anywhere
MediumCVE-2025-45146: n/a
CriticalCVE-2025-38213
LowCVE-2025-8859: Unrestricted Upload in code-projects eBlog Site
MediumCVE-2025-8865: CWE-476 NULL Pointer Dereference in YugabyteDB Inc YugabyteDB
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.