Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55107: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri Portal for ArcGIS Enterprise Sites

0
Medium
VulnerabilityCVE-2025-55107cvecve-2025-55107cwe-79
Published: Thu Aug 21 2025 (08/21/2025, 19:29:59 UTC)
Source: CVE Database V5
Vendor/Project: Esri
Product: Portal for ArcGIS Enterprise Sites

Description

There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Sites versions 10.9.1 – 11.4 that may allow a remote, authenticated attacker to inject malicious a file with an embedded xss script which when loaded could potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high. The attack could disclose a privileged token which may result in the attacker gaining full control of the Portal.

AI-Powered Analysis

AILast updated: 09/19/2025, 00:14:14 UTC

Technical Analysis

CVE-2025-55107 is a stored Cross-site Scripting (XSS) vulnerability identified in Esri Portal for ArcGIS Enterprise Sites, specifically affecting versions 10.9.1 through 11.4. This vulnerability arises from improper neutralization of input during web page generation (CWE-79), allowing a remote attacker with high privileges and authenticated access to inject malicious files containing embedded JavaScript code. When these files are loaded by a victim, the malicious script executes in the context of the victim's browser. The attack requires the attacker to have high-level privileges within the Portal, which implies that the attacker must already have significant access to the system. Successful exploitation could lead to disclosure of privileged tokens, potentially enabling the attacker to escalate their control and gain full administrative access to the Portal environment. The vulnerability has a CVSS v3.1 base score of 4.8 (medium severity), reflecting that while the attack vector is network-based and requires low attack complexity, it demands high privileges and user interaction. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability affects a critical component used for enterprise geographic information system (GIS) management and collaboration, which is often integrated into broader organizational IT infrastructure.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for entities relying on Esri Portal for ArcGIS Enterprise Sites for critical GIS operations such as urban planning, environmental monitoring, utilities management, and defense. Exploitation could lead to unauthorized disclosure of sensitive geographic data and administrative tokens, resulting in potential data breaches, manipulation of GIS data, and disruption of services dependent on accurate spatial information. The ability to execute arbitrary JavaScript in users' browsers could also facilitate further attacks such as session hijacking, credential theft, or lateral movement within the network. Given the high privileges required, the threat is more pronounced in environments where internal threat actors or compromised accounts exist. The vulnerability could undermine trust in GIS data integrity and availability, impacting decision-making processes and operational continuity in sectors critical to European infrastructure and governance.

Mitigation Recommendations

To mitigate this vulnerability effectively, European organizations should: 1) Immediately review and restrict high-privilege accounts to minimize the risk of credential compromise. 2) Implement strict input validation and sanitization controls on all user-uploaded files and content within the Portal environment, even beyond vendor patches. 3) Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers accessing the Portal. 4) Monitor logs and user activity for unusual file uploads or access patterns indicative of attempted exploitation. 5) Segment the Portal infrastructure from other critical systems to contain potential breaches. 6) Apply vendor patches promptly once released, and maintain up-to-date software versions. 7) Conduct regular security awareness training for administrators and users with elevated privileges to recognize phishing or social engineering attempts that could lead to account compromise. 8) Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script injections targeting the Portal.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Esri
Date Reserved
2025-08-06T23:18:36.509Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a77460ad5a09ad00179dd7

Added to database: 8/21/2025, 7:32:48 PM

Last enriched: 9/19/2025, 12:14:14 AM

Last updated: 10/7/2025, 1:50:11 PM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats