Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55103: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri Portal for ArcGIS Enterprise Sites

0
Medium
VulnerabilityCVE-2025-55103cvecve-2025-55103cwe-79
Published: Thu Aug 21 2025 (08/21/2025, 19:25:13 UTC)
Source: CVE Database V5
Vendor/Project: Esri
Product: Portal for ArcGIS Enterprise Sites

Description

There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Sites versions 10.9.1 – 11.4 that may allow a remote, authenticated attacker to inject malicious a file with an embedded xss script which when loaded could potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high. The attack could disclose a privileged token which may result in the attacker gaining full control of the Portal.

AI-Powered Analysis

AILast updated: 09/09/2025, 21:24:00 UTC

Technical Analysis

CVE-2025-55103 is a stored Cross-site Scripting (XSS) vulnerability identified in Esri Portal for ArcGIS Enterprise Sites, specifically affecting versions 10.9.1 through 11.4. This vulnerability arises due to improper neutralization of input during web page generation (CWE-79), allowing an authenticated attacker with high privileges to inject malicious files containing embedded JavaScript code. When a victim loads the infected file, the malicious script executes in their browser context. The attack requires high-level privileges and user interaction (loading the malicious file). Successful exploitation could disclose privileged tokens, potentially enabling the attacker to escalate control and gain full administrative access to the Portal environment. The vulnerability has a CVSS 3.1 base score of 4.8 (medium severity), reflecting network attack vector, low attack complexity, high privileges required, and user interaction needed. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability affects a critical component used for enterprise geographic information system (GIS) portal services, which are often integral to organizational infrastructure for spatial data management and sharing.

Potential Impact

For European organizations, the impact of this vulnerability could be significant, especially for those relying on Esri Portal for ArcGIS Enterprise Sites for critical GIS operations, urban planning, environmental monitoring, and infrastructure management. Exploitation could lead to unauthorized disclosure of sensitive spatial data, manipulation of GIS content, and potential takeover of the portal, undermining data integrity and availability. The exposure of privileged tokens could facilitate lateral movement within the network, increasing the risk of broader compromise. Given the reliance on GIS data for public safety, transportation, and utilities management in Europe, disruption or manipulation could have cascading effects on operational continuity and decision-making. Additionally, regulatory frameworks such as GDPR impose strict data protection requirements, and a breach involving sensitive data could result in legal and financial repercussions.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Immediately review and restrict high-privilege access to the Portal, ensuring only necessary personnel have such rights. 2) Implement strict input validation and sanitization controls on all user-uploaded files and content within the Portal environment. 3) Monitor and audit Portal logs for unusual file uploads or script execution attempts. 4) Educate users with high privileges about the risks of loading untrusted files and enforce policies to avoid opening suspicious content. 5) Apply any available vendor patches or updates as soon as they are released by Esri. 6) Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block XSS payloads targeting the Portal. 7) Conduct regular security assessments and penetration testing focused on the Portal to identify and remediate similar input validation issues proactively. 8) Employ network segmentation to limit the Portal’s access to critical backend systems, reducing potential lateral movement if compromised.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Esri
Date Reserved
2025-08-06T23:18:36.508Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a77460ad5a09ad00179dcb

Added to database: 8/21/2025, 7:32:48 PM

Last enriched: 9/9/2025, 9:24:00 PM

Last updated: 10/7/2025, 1:50:06 PM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats