CVE-2025-55107: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri Portal for ArcGIS Enterprise Sites
There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Sites versions 10.9.1 – 11.4 that may allow a remote, authenticated attacker to inject malicious a file with an embedded xss script which when loaded could potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high. The attack could disclose a privileged token which may result in the attacker gaining full control of the Portal.
AI Analysis
Technical Summary
CVE-2025-55107 is a stored Cross-site Scripting (XSS) vulnerability identified in Esri Portal for ArcGIS Enterprise Sites, specifically affecting versions 10.9.1 through 11.4. This vulnerability arises from improper neutralization of input during web page generation (CWE-79), allowing a remote attacker with high privileges and authenticated access to inject malicious files containing embedded JavaScript code. When these files are loaded by a victim, the malicious script executes in the context of the victim's browser. The attack requires the attacker to have high-level privileges within the Portal, which implies that the attacker must already have significant access to the system. Successful exploitation could lead to disclosure of privileged tokens, potentially enabling the attacker to escalate their control and gain full administrative access to the Portal environment. The vulnerability has a CVSS v3.1 base score of 4.8 (medium severity), reflecting that while the attack vector is network-based and requires low attack complexity, it demands high privileges and user interaction. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability affects a critical component used for enterprise geographic information system (GIS) management and collaboration, which is often integrated into broader organizational IT infrastructure.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for entities relying on Esri Portal for ArcGIS Enterprise Sites for critical GIS operations such as urban planning, environmental monitoring, utilities management, and defense. Exploitation could lead to unauthorized disclosure of sensitive geographic data and administrative tokens, resulting in potential data breaches, manipulation of GIS data, and disruption of services dependent on accurate spatial information. The ability to execute arbitrary JavaScript in users' browsers could also facilitate further attacks such as session hijacking, credential theft, or lateral movement within the network. Given the high privileges required, the threat is more pronounced in environments where internal threat actors or compromised accounts exist. The vulnerability could undermine trust in GIS data integrity and availability, impacting decision-making processes and operational continuity in sectors critical to European infrastructure and governance.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should: 1) Immediately review and restrict high-privilege accounts to minimize the risk of credential compromise. 2) Implement strict input validation and sanitization controls on all user-uploaded files and content within the Portal environment, even beyond vendor patches. 3) Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers accessing the Portal. 4) Monitor logs and user activity for unusual file uploads or access patterns indicative of attempted exploitation. 5) Segment the Portal infrastructure from other critical systems to contain potential breaches. 6) Apply vendor patches promptly once released, and maintain up-to-date software versions. 7) Conduct regular security awareness training for administrators and users with elevated privileges to recognize phishing or social engineering attempts that could lead to account compromise. 8) Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script injections targeting the Portal.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden, Poland, Finland
CVE-2025-55107: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri Portal for ArcGIS Enterprise Sites
Description
There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Sites versions 10.9.1 – 11.4 that may allow a remote, authenticated attacker to inject malicious a file with an embedded xss script which when loaded could potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high. The attack could disclose a privileged token which may result in the attacker gaining full control of the Portal.
AI-Powered Analysis
Technical Analysis
CVE-2025-55107 is a stored Cross-site Scripting (XSS) vulnerability identified in Esri Portal for ArcGIS Enterprise Sites, specifically affecting versions 10.9.1 through 11.4. This vulnerability arises from improper neutralization of input during web page generation (CWE-79), allowing a remote attacker with high privileges and authenticated access to inject malicious files containing embedded JavaScript code. When these files are loaded by a victim, the malicious script executes in the context of the victim's browser. The attack requires the attacker to have high-level privileges within the Portal, which implies that the attacker must already have significant access to the system. Successful exploitation could lead to disclosure of privileged tokens, potentially enabling the attacker to escalate their control and gain full administrative access to the Portal environment. The vulnerability has a CVSS v3.1 base score of 4.8 (medium severity), reflecting that while the attack vector is network-based and requires low attack complexity, it demands high privileges and user interaction. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability affects a critical component used for enterprise geographic information system (GIS) management and collaboration, which is often integrated into broader organizational IT infrastructure.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for entities relying on Esri Portal for ArcGIS Enterprise Sites for critical GIS operations such as urban planning, environmental monitoring, utilities management, and defense. Exploitation could lead to unauthorized disclosure of sensitive geographic data and administrative tokens, resulting in potential data breaches, manipulation of GIS data, and disruption of services dependent on accurate spatial information. The ability to execute arbitrary JavaScript in users' browsers could also facilitate further attacks such as session hijacking, credential theft, or lateral movement within the network. Given the high privileges required, the threat is more pronounced in environments where internal threat actors or compromised accounts exist. The vulnerability could undermine trust in GIS data integrity and availability, impacting decision-making processes and operational continuity in sectors critical to European infrastructure and governance.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should: 1) Immediately review and restrict high-privilege accounts to minimize the risk of credential compromise. 2) Implement strict input validation and sanitization controls on all user-uploaded files and content within the Portal environment, even beyond vendor patches. 3) Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers accessing the Portal. 4) Monitor logs and user activity for unusual file uploads or access patterns indicative of attempted exploitation. 5) Segment the Portal infrastructure from other critical systems to contain potential breaches. 6) Apply vendor patches promptly once released, and maintain up-to-date software versions. 7) Conduct regular security awareness training for administrators and users with elevated privileges to recognize phishing or social engineering attempts that could lead to account compromise. 8) Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script injections targeting the Portal.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Esri
- Date Reserved
- 2025-08-06T23:18:36.509Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68a77460ad5a09ad00179dd7
Added to database: 8/21/2025, 7:32:48 PM
Last enriched: 9/19/2025, 12:14:14 AM
Last updated: 10/7/2025, 1:50:11 PM
Views: 42
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Hackers Stole Data From Public Safety Comms Firm BK Technologies
MediumCVE-2025-11396: SQL Injection in code-projects Simple Food Ordering System
MediumCVE-2025-40889: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Nozomi Networks Guardian
HighCVE-2025-40888: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40887: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.