Skip to main content

CVE-2025-55105: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri Portal for ArcGIS Enterprise Experience Sites

Medium
VulnerabilityCVE-2025-55105cvecve-2025-55105cwe-79
Published: Thu Aug 21 2025 (08/21/2025, 19:29:01 UTC)
Source: CVE Database V5
Vendor/Project: Esri
Product: Portal for ArcGIS Enterprise Experience Sites

Description

There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Sites versions 10.9.1 – 11.4 that may allow a remote, authenticated attacker to inject malicious a file with an embedded xss script which when loaded could potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high. The attack could disclose a privileged token which may result in the attacker gaining full control of the Portal.

AI-Powered Analysis

AILast updated: 08/21/2025, 19:48:34 UTC

Technical Analysis

CVE-2025-55105 is a stored Cross-site Scripting (XSS) vulnerability identified in Esri Portal for ArcGIS Enterprise Experience Sites, specifically affecting versions 10.9.1 through 11.4. This vulnerability arises from improper neutralization of input during web page generation (CWE-79), allowing a remote attacker with high privileges and authenticated access to inject malicious scripts embedded within uploaded files. When a victim loads the compromised file or page, the embedded JavaScript executes in their browser context. This can lead to the disclosure of privileged tokens, which may allow the attacker to escalate privileges and gain full control over the Portal environment. The vulnerability requires high privileges to exploit and user interaction, as the victim must load the malicious content for the script to execute. The CVSS 3.1 base score is 4.8 (medium severity), reflecting network attack vector, low attack complexity, high privileges required, and user interaction needed. The scope is changed, indicating that the vulnerability affects components beyond the initially vulnerable module. No known exploits are currently reported in the wild, and no patches are linked yet, suggesting that organizations should prioritize monitoring and mitigation efforts. The vulnerability impacts the confidentiality and integrity of the Portal environment but does not directly affect availability. Given the critical role of Esri Portal for ArcGIS in geospatial data management and enterprise GIS deployments, exploitation could lead to significant unauthorized access and data compromise within affected organizations.

Potential Impact

For European organizations, especially those in government, utilities, transportation, environmental monitoring, and critical infrastructure sectors that rely heavily on Esri's ArcGIS Enterprise solutions, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized disclosure of sensitive geospatial data, manipulation of GIS services, and potential disruption of decision-making processes dependent on accurate spatial information. The ability to gain full control over the Portal could allow attackers to alter or delete critical datasets, inject further malicious content, or pivot to other internal systems. Given the high privileges required, the threat is more pronounced in environments where multiple users have elevated access or where access controls are insufficiently enforced. The medium CVSS score suggests moderate urgency, but the potential for privilege escalation and full Portal compromise elevates the risk profile. Additionally, the cross-site scripting nature of the vulnerability could facilitate phishing or social engineering attacks targeting privileged users. European organizations must consider the regulatory implications, including GDPR, as unauthorized access or data leakage involving personal or sensitive data could lead to compliance violations and financial penalties.

Mitigation Recommendations

To mitigate this vulnerability effectively, European organizations should: 1) Immediately review and restrict high-privilege user accounts to the minimum necessary, enforcing strict role-based access controls and multi-factor authentication to reduce the risk of credential compromise. 2) Implement rigorous input validation and sanitization on all file uploads and user-generated content within the Portal environment, even if patches are not yet available. 3) Monitor Portal logs and user activity for unusual behavior indicative of attempted exploitation, such as unexpected file uploads or script execution attempts. 4) Educate privileged users about the risks of loading untrusted files or content within the Portal and encourage cautious behavior. 5) Engage with Esri support and subscribe to security advisories to promptly apply patches or updates once released. 6) Consider deploying web application firewalls (WAFs) with custom rules to detect and block malicious script payloads targeting the Portal. 7) Conduct regular security assessments and penetration testing focused on the ArcGIS Enterprise environment to identify and remediate similar vulnerabilities proactively. 8) Isolate the Portal environment within segmented network zones to limit lateral movement if compromise occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Esri
Date Reserved
2025-08-06T23:18:36.508Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a77460ad5a09ad00179dd1

Added to database: 8/21/2025, 7:32:48 PM

Last enriched: 8/21/2025, 7:48:34 PM

Last updated: 8/21/2025, 8:32:48 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats