Skip to main content

CVE-2025-55103: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri Portal for ArcGIS Enterprise Sites

Medium
VulnerabilityCVE-2025-55103cvecve-2025-55103cwe-79
Published: Thu Aug 21 2025 (08/21/2025, 19:25:13 UTC)
Source: CVE Database V5
Vendor/Project: Esri
Product: Portal for ArcGIS Enterprise Sites

Description

There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Sites versions 10.9.1 – 11.4 that may allow a remote, authenticated attacker to inject malicious a file with an embedded xss script which when loaded could potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high. The attack could disclose a privileged token which may result in the attacker gaining full control of the Portal.

AI-Powered Analysis

AILast updated: 08/21/2025, 19:49:11 UTC

Technical Analysis

CVE-2025-55103 is a stored Cross-site Scripting (XSS) vulnerability identified in Esri Portal for ArcGIS Enterprise Sites, specifically affecting versions 10.9.1 through 11.4. This vulnerability arises due to improper neutralization of input during web page generation (CWE-79), allowing a remote, authenticated attacker with high privileges to inject malicious files containing embedded JavaScript code. When such a file is loaded by a victim, the malicious script executes in the context of the victim’s browser. The attack requires user interaction (loading the malicious file) and privileges to upload or inject content, which limits exploitation to users with elevated access rights. Successful exploitation can lead to disclosure of privileged tokens, potentially granting the attacker full control over the Portal environment. The vulnerability has a CVSS 3.1 base score of 4.8 (medium severity), reflecting its moderate impact and exploitation complexity. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects a critical component used for managing and sharing geographic information system (GIS) data within organizations, making it a significant risk for entities relying on Esri’s Portal for ArcGIS Enterprise Sites for spatial data collaboration and operations.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to entities using Esri Portal for ArcGIS Enterprise Sites for GIS data management, including government agencies, urban planning departments, environmental monitoring bodies, and private sector companies involved in logistics, utilities, and infrastructure. Exploitation could lead to unauthorized access to sensitive spatial data and administrative control over the portal, potentially disrupting critical services or exposing confidential information. Given the high privileges required, the threat is more likely to originate from insider threats or compromised privileged accounts. The ability to execute arbitrary JavaScript could also facilitate further attacks such as session hijacking, privilege escalation, or lateral movement within the network. The medium CVSS score indicates a moderate risk, but the strategic importance of GIS data in sectors like transportation, energy, and public safety in Europe elevates the potential operational impact. Additionally, the cross-site scripting nature of the vulnerability could undermine user trust and compliance with data protection regulations such as GDPR if sensitive data is exposed or manipulated.

Mitigation Recommendations

European organizations should implement several targeted mitigation strategies beyond generic advice: 1) Restrict and monitor high-privilege user accounts to minimize the risk of malicious file uploads; enforce strict access controls and use multi-factor authentication (MFA) for all privileged users. 2) Conduct thorough input validation and sanitization on all user-uploaded files and content within the Portal, employing web application firewalls (WAFs) with custom rules to detect and block suspicious payloads. 3) Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in users’ browsers. 4) Regularly audit and review portal activity logs to detect anomalous behavior indicative of exploitation attempts. 5) Coordinate with Esri for timely patch deployment once available and test updates in controlled environments before production rollout. 6) Educate privileged users about the risks of XSS and safe handling of portal content. 7) Segment the network hosting the Portal to limit lateral movement in case of compromise. These measures collectively reduce the attack surface and improve detection and response capabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Esri
Date Reserved
2025-08-06T23:18:36.508Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a77460ad5a09ad00179dcb

Added to database: 8/21/2025, 7:32:48 PM

Last enriched: 8/21/2025, 7:49:11 PM

Last updated: 8/22/2025, 12:34:55 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats