CVE-2025-55103: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri Portal for ArcGIS Enterprise Sites
There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Sites versions 10.9.1 – 11.4 that may allow a remote, authenticated attacker to inject malicious a file with an embedded xss script which when loaded could potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high. The attack could disclose a privileged token which may result in the attacker gaining full control of the Portal.
AI Analysis
Technical Summary
CVE-2025-55103 is a stored Cross-site Scripting (XSS) vulnerability identified in Esri Portal for ArcGIS Enterprise Sites, specifically affecting versions 10.9.1 through 11.4. This vulnerability arises due to improper neutralization of input during web page generation (CWE-79), allowing an authenticated attacker with high privileges to inject malicious files containing embedded JavaScript code. When a victim loads the infected file, the malicious script executes in their browser context. The attack requires high-level privileges and user interaction (loading the malicious file). Successful exploitation could disclose privileged tokens, potentially enabling the attacker to escalate control and gain full administrative access to the Portal environment. The vulnerability has a CVSS 3.1 base score of 4.8 (medium severity), reflecting network attack vector, low attack complexity, high privileges required, and user interaction needed. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability affects a critical component used for enterprise geographic information system (GIS) portal services, which are often integral to organizational infrastructure for spatial data management and sharing.
Potential Impact
For European organizations, the impact of this vulnerability could be significant, especially for those relying on Esri Portal for ArcGIS Enterprise Sites for critical GIS operations, urban planning, environmental monitoring, and infrastructure management. Exploitation could lead to unauthorized disclosure of sensitive spatial data, manipulation of GIS content, and potential takeover of the portal, undermining data integrity and availability. The exposure of privileged tokens could facilitate lateral movement within the network, increasing the risk of broader compromise. Given the reliance on GIS data for public safety, transportation, and utilities management in Europe, disruption or manipulation could have cascading effects on operational continuity and decision-making. Additionally, regulatory frameworks such as GDPR impose strict data protection requirements, and a breach involving sensitive data could result in legal and financial repercussions.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately review and restrict high-privilege access to the Portal, ensuring only necessary personnel have such rights. 2) Implement strict input validation and sanitization controls on all user-uploaded files and content within the Portal environment. 3) Monitor and audit Portal logs for unusual file uploads or script execution attempts. 4) Educate users with high privileges about the risks of loading untrusted files and enforce policies to avoid opening suspicious content. 5) Apply any available vendor patches or updates as soon as they are released by Esri. 6) Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block XSS payloads targeting the Portal. 7) Conduct regular security assessments and penetration testing focused on the Portal to identify and remediate similar input validation issues proactively. 8) Employ network segmentation to limit the Portal’s access to critical backend systems, reducing potential lateral movement if compromised.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden, Poland, Finland
CVE-2025-55103: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri Portal for ArcGIS Enterprise Sites
Description
There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Sites versions 10.9.1 – 11.4 that may allow a remote, authenticated attacker to inject malicious a file with an embedded xss script which when loaded could potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high. The attack could disclose a privileged token which may result in the attacker gaining full control of the Portal.
AI-Powered Analysis
Technical Analysis
CVE-2025-55103 is a stored Cross-site Scripting (XSS) vulnerability identified in Esri Portal for ArcGIS Enterprise Sites, specifically affecting versions 10.9.1 through 11.4. This vulnerability arises due to improper neutralization of input during web page generation (CWE-79), allowing an authenticated attacker with high privileges to inject malicious files containing embedded JavaScript code. When a victim loads the infected file, the malicious script executes in their browser context. The attack requires high-level privileges and user interaction (loading the malicious file). Successful exploitation could disclose privileged tokens, potentially enabling the attacker to escalate control and gain full administrative access to the Portal environment. The vulnerability has a CVSS 3.1 base score of 4.8 (medium severity), reflecting network attack vector, low attack complexity, high privileges required, and user interaction needed. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability affects a critical component used for enterprise geographic information system (GIS) portal services, which are often integral to organizational infrastructure for spatial data management and sharing.
Potential Impact
For European organizations, the impact of this vulnerability could be significant, especially for those relying on Esri Portal for ArcGIS Enterprise Sites for critical GIS operations, urban planning, environmental monitoring, and infrastructure management. Exploitation could lead to unauthorized disclosure of sensitive spatial data, manipulation of GIS content, and potential takeover of the portal, undermining data integrity and availability. The exposure of privileged tokens could facilitate lateral movement within the network, increasing the risk of broader compromise. Given the reliance on GIS data for public safety, transportation, and utilities management in Europe, disruption or manipulation could have cascading effects on operational continuity and decision-making. Additionally, regulatory frameworks such as GDPR impose strict data protection requirements, and a breach involving sensitive data could result in legal and financial repercussions.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately review and restrict high-privilege access to the Portal, ensuring only necessary personnel have such rights. 2) Implement strict input validation and sanitization controls on all user-uploaded files and content within the Portal environment. 3) Monitor and audit Portal logs for unusual file uploads or script execution attempts. 4) Educate users with high privileges about the risks of loading untrusted files and enforce policies to avoid opening suspicious content. 5) Apply any available vendor patches or updates as soon as they are released by Esri. 6) Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block XSS payloads targeting the Portal. 7) Conduct regular security assessments and penetration testing focused on the Portal to identify and remediate similar input validation issues proactively. 8) Employ network segmentation to limit the Portal’s access to critical backend systems, reducing potential lateral movement if compromised.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Esri
- Date Reserved
- 2025-08-06T23:18:36.508Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68a77460ad5a09ad00179dcb
Added to database: 8/21/2025, 7:32:48 PM
Last enriched: 9/9/2025, 9:24:00 PM
Last updated: 10/7/2025, 1:50:06 PM
Views: 31
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Hackers Stole Data From Public Safety Comms Firm BK Technologies
MediumCVE-2025-11396: SQL Injection in code-projects Simple Food Ordering System
MediumCVE-2025-40889: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Nozomi Networks Guardian
HighCVE-2025-40888: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40887: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.