Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-4967: CWE-918 Server-Side Request Forgery (SSRF)SSRF in Esri Portal for ArcGIS

0
Critical
VulnerabilityCVE-2025-4967cvecve-2025-4967cwe-918
Published: Thu May 29 2025 (05/29/2025, 19:58:47 UTC)
Source: CVE Database V5
Vendor/Project: Esri
Product: Portal for ArcGIS

Description

Esri Portal for ArcGIS 11.4 and prior allows a remote, unauthenticated attacker to bypass the Portal’s SSRF protections.

AI-Powered Analysis

AILast updated: 12/16/2025, 04:13:46 UTC

Technical Analysis

CVE-2025-4967 is a critical SSRF vulnerability (CWE-918) found in Esri Portal for ArcGIS versions 11.4 and prior. SSRF vulnerabilities occur when an attacker can abuse a server to send crafted requests to internal or external systems that the attacker cannot directly access. In this case, the Portal’s SSRF protections can be bypassed by a remote attacker without any authentication, allowing them to induce the server to make arbitrary HTTP requests. This can lead to unauthorized access to internal services, exposure of sensitive data, or facilitate further attacks such as internal network reconnaissance or exploitation of other vulnerabilities within the network. The CVSS 3.1 score of 9.1 reflects the vulnerability’s high impact on confidentiality and integrity, with no privileges or user interaction required, and network attack vector. Although no public exploits are reported yet, the severity and ease of exploitation make this a significant threat. Esri Portal for ArcGIS is widely used in geographic information system (GIS) deployments, often in critical infrastructure, government, and enterprise environments, increasing the potential impact of this vulnerability. The lack of an available patch at the time of disclosure necessitates immediate risk mitigation through network segmentation and monitoring.

Potential Impact

For European organizations, the impact of CVE-2025-4967 can be substantial. Esri Portal for ArcGIS is commonly used by government agencies, urban planners, environmental organizations, and enterprises managing geospatial data. Exploitation could allow attackers to access internal networks, bypass firewalls, and retrieve sensitive geographic or operational data. This could compromise confidentiality of critical infrastructure information and integrity of GIS data, potentially disrupting decision-making processes. The vulnerability’s unauthenticated nature increases risk of widespread exploitation, especially in environments where Portal for ArcGIS is exposed to the internet. Additionally, SSRF can be a stepping stone for lateral movement within networks, increasing the risk of broader compromise. European organizations involved in smart city initiatives, transportation, defense, and utilities are particularly vulnerable due to their reliance on GIS technologies. The lack of known exploits currently provides a window for proactive defense, but the critical severity demands urgent attention to prevent potential future attacks.

Mitigation Recommendations

Until an official patch is released by Esri, European organizations should implement several targeted mitigations: 1) Restrict outbound HTTP/HTTPS requests from the Portal for ArcGIS server to only trusted destinations using firewall rules or proxy controls to limit SSRF exploitation scope. 2) Employ network segmentation to isolate the Portal server from sensitive internal systems and data repositories. 3) Monitor server logs and network traffic for unusual or unexpected outbound requests indicative of SSRF attempts. 4) Disable or tightly control any features or plugins in Portal for ArcGIS that perform server-side HTTP requests if not essential. 5) Conduct internal vulnerability assessments and penetration testing focused on SSRF vectors to identify potential exploitation paths. 6) Prepare for rapid deployment of patches by maintaining close communication with Esri support and subscribing to security advisories. 7) Educate IT and security teams about SSRF risks and detection techniques specific to GIS environments. These steps go beyond generic advice by focusing on network-level controls and operational readiness tailored to the Portal for ArcGIS context.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Esri
Date Reserved
2025-05-19T20:42:42.569Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6838c00b182aa0cae28c8a38

Added to database: 5/29/2025, 8:14:03 PM

Last enriched: 12/16/2025, 4:13:46 AM

Last updated: 1/7/2026, 4:48:50 AM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats