Skip to main content

CVE-2025-55107: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri Portal for ArcGIS Enterprise Sites

Medium
VulnerabilityCVE-2025-55107cvecve-2025-55107cwe-79
Published: Thu Aug 21 2025 (08/21/2025, 19:29:59 UTC)
Source: CVE Database V5
Vendor/Project: Esri
Product: Portal for ArcGIS Enterprise Sites

Description

There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Sites versions 10.9.1 – 11.4 that may allow a remote, authenticated attacker to inject malicious a file with an embedded xss script which when loaded could potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high. The attack could disclose a privileged token which may result in the attacker gaining full control of the Portal.

AI-Powered Analysis

AILast updated: 08/21/2025, 19:47:53 UTC

Technical Analysis

CVE-2025-55107 is a stored Cross-site Scripting (XSS) vulnerability identified in Esri Portal for ArcGIS Enterprise Sites, specifically affecting versions 10.9.1 through 11.4. This vulnerability arises from improper neutralization of input during web page generation (CWE-79), allowing an authenticated attacker with high privileges to inject malicious files containing embedded XSS scripts. When these malicious files are loaded by a victim, arbitrary JavaScript code can execute within the victim's browser context. The attack requires the attacker to be authenticated with elevated privileges, which limits the attack surface but increases the risk if such credentials are compromised or misused. Successful exploitation can lead to disclosure of privileged tokens, potentially granting the attacker full control over the Portal for ArcGIS Enterprise instance. The vulnerability has a CVSS v3.1 base score of 4.8 (medium severity), reflecting network attack vector, low attack complexity, high privileges required, and user interaction needed. The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability impacts the confidentiality and integrity of the system by enabling token theft and unauthorized control, but does not directly affect availability. Given the critical role of Esri Portal for ArcGIS in managing geographic information systems (GIS) and spatial data, this vulnerability poses a significant risk to organizations relying on this platform for sensitive geospatial data and operations.

Potential Impact

For European organizations, the impact of CVE-2025-55107 can be substantial, particularly for government agencies, urban planning departments, environmental monitoring bodies, and private sector companies that utilize Esri's ArcGIS Enterprise for critical geospatial data management. Exploitation could lead to unauthorized access to sensitive spatial data, manipulation of GIS resources, and potential disruption of services reliant on accurate geographic information. The disclosure of privileged tokens could allow attackers to escalate privileges, modify or exfiltrate data, and undermine trust in spatial data integrity. This is especially critical in sectors such as defense, infrastructure management, and emergency response, where compromised GIS data could have cascading effects on public safety and national security. The requirement for high privileges and user interaction somewhat limits the attack vector but does not eliminate risk, as insiders or compromised accounts could be leveraged. The medium CVSS score suggests moderate urgency, but the strategic importance of affected systems in Europe elevates the practical impact beyond the numeric score.

Mitigation Recommendations

1. Immediate mitigation should focus on restricting access to the Portal for ArcGIS Enterprise Sites to trusted administrators and enforcing strict privilege management to minimize the number of users with high-level access. 2. Implement robust input validation and sanitization on all file upload and web page generation components to prevent injection of malicious scripts. 3. Monitor and audit user activities, especially those with elevated privileges, to detect anomalous behavior indicative of exploitation attempts. 4. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing the portal. 5. Regularly update and patch the Esri Portal for ArcGIS Enterprise Sites software as vendor patches become available; in the absence of patches, consider temporary disabling of file upload features or limiting file types accepted. 6. Educate administrators and users on the risks of XSS and the importance of cautious interaction with uploaded content. 7. Use multi-factor authentication (MFA) to reduce the risk of credential compromise for privileged accounts. 8. Conduct penetration testing and vulnerability assessments focused on web application security to identify and remediate similar issues proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Esri
Date Reserved
2025-08-06T23:18:36.509Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a77460ad5a09ad00179dd7

Added to database: 8/21/2025, 7:32:48 PM

Last enriched: 8/21/2025, 7:47:53 PM

Last updated: 8/21/2025, 8:17:51 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats