CVE-2025-57873: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri Portal for ArcGIS
There is a reflected cross site scripting vulnerability in Esri Portal for ArcGIS 11.4 and below that may allow a remote authenticated attacker with administrative access to supply a crafted string which would execute arbitrary JavaScript code in the browser.
AI Analysis
Technical Summary
CVE-2025-57873 is a reflected Cross-Site Scripting (XSS) vulnerability identified in Esri Portal for ArcGIS versions 11.4 and below, specifically noted in version 10.9.1. This vulnerability arises from improper neutralization of input during web page generation (CWE-79), allowing an authenticated attacker with administrative privileges to inject crafted strings that execute arbitrary JavaScript code in the context of the victim's browser. The attack requires the attacker to have administrative access and involves supplying malicious input that is reflected back in the web interface without adequate sanitization or encoding. The vulnerability is classified as reflected XSS, meaning the malicious payload is not stored but reflected immediately in the response. The CVSS v3.1 base score is 4.8 (medium severity), with vector AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N, indicating network attack vector, low attack complexity, high privileges required, user interaction required, scope changed, and low impact on confidentiality and integrity, with no impact on availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects a critical component used for geographic information system (GIS) portal management, which is often deployed in enterprise and government environments for spatial data sharing and collaboration.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for entities relying on Esri Portal for ArcGIS for critical GIS services such as urban planning, environmental monitoring, transportation management, and emergency response coordination. An attacker exploiting this vulnerability could execute arbitrary JavaScript in the context of an administrative user’s browser, potentially leading to session hijacking, credential theft, or unauthorized actions performed with administrative privileges. This could compromise the integrity and confidentiality of sensitive spatial data and disrupt operational workflows. Although the vulnerability requires administrative authentication and user interaction, the potential for lateral movement and privilege escalation within an organization’s GIS infrastructure poses a risk. Given the widespread use of Esri products in European public sector agencies and private enterprises, exploitation could lead to data leaks, manipulation of geographic data, and erosion of trust in critical infrastructure systems.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately restrict administrative access to the Portal for ArcGIS to trusted personnel and networks, employing strong multi-factor authentication to reduce the risk of compromised credentials. 2) Implement strict input validation and output encoding on all user-supplied data within the portal interface, especially for administrative functions, to prevent injection of malicious scripts. 3) Monitor and audit administrative activities and web application logs for unusual patterns indicative of attempted XSS exploitation. 4) Apply network segmentation to isolate the GIS portal from broader enterprise networks, limiting the blast radius of any successful attack. 5) Engage with Esri support and subscribe to security advisories to obtain and deploy patches or updates as soon as they become available. 6) Educate administrative users about the risks of interacting with untrusted links or inputs within the portal environment to reduce the likelihood of successful user interaction exploitation. 7) Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block reflected XSS payloads targeting the portal.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden, Poland, Finland
CVE-2025-57873: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri Portal for ArcGIS
Description
There is a reflected cross site scripting vulnerability in Esri Portal for ArcGIS 11.4 and below that may allow a remote authenticated attacker with administrative access to supply a crafted string which would execute arbitrary JavaScript code in the browser.
AI-Powered Analysis
Technical Analysis
CVE-2025-57873 is a reflected Cross-Site Scripting (XSS) vulnerability identified in Esri Portal for ArcGIS versions 11.4 and below, specifically noted in version 10.9.1. This vulnerability arises from improper neutralization of input during web page generation (CWE-79), allowing an authenticated attacker with administrative privileges to inject crafted strings that execute arbitrary JavaScript code in the context of the victim's browser. The attack requires the attacker to have administrative access and involves supplying malicious input that is reflected back in the web interface without adequate sanitization or encoding. The vulnerability is classified as reflected XSS, meaning the malicious payload is not stored but reflected immediately in the response. The CVSS v3.1 base score is 4.8 (medium severity), with vector AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N, indicating network attack vector, low attack complexity, high privileges required, user interaction required, scope changed, and low impact on confidentiality and integrity, with no impact on availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects a critical component used for geographic information system (GIS) portal management, which is often deployed in enterprise and government environments for spatial data sharing and collaboration.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for entities relying on Esri Portal for ArcGIS for critical GIS services such as urban planning, environmental monitoring, transportation management, and emergency response coordination. An attacker exploiting this vulnerability could execute arbitrary JavaScript in the context of an administrative user’s browser, potentially leading to session hijacking, credential theft, or unauthorized actions performed with administrative privileges. This could compromise the integrity and confidentiality of sensitive spatial data and disrupt operational workflows. Although the vulnerability requires administrative authentication and user interaction, the potential for lateral movement and privilege escalation within an organization’s GIS infrastructure poses a risk. Given the widespread use of Esri products in European public sector agencies and private enterprises, exploitation could lead to data leaks, manipulation of geographic data, and erosion of trust in critical infrastructure systems.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately restrict administrative access to the Portal for ArcGIS to trusted personnel and networks, employing strong multi-factor authentication to reduce the risk of compromised credentials. 2) Implement strict input validation and output encoding on all user-supplied data within the portal interface, especially for administrative functions, to prevent injection of malicious scripts. 3) Monitor and audit administrative activities and web application logs for unusual patterns indicative of attempted XSS exploitation. 4) Apply network segmentation to isolate the GIS portal from broader enterprise networks, limiting the blast radius of any successful attack. 5) Engage with Esri support and subscribe to security advisories to obtain and deploy patches or updates as soon as they become available. 6) Educate administrative users about the risks of interacting with untrusted links or inputs within the portal environment to reduce the likelihood of successful user interaction exploitation. 7) Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block reflected XSS payloads targeting the portal.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Esri
- Date Reserved
- 2025-08-21T19:31:57.229Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68dad2d15387373ba0f2cb13
Added to database: 9/29/2025, 6:41:21 PM
Last enriched: 9/29/2025, 6:43:12 PM
Last updated: 10/7/2025, 1:50:28 PM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Hackers Stole Data From Public Safety Comms Firm BK Technologies
MediumCVE-2025-11396: SQL Injection in code-projects Simple Food Ordering System
MediumCVE-2025-40889: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Nozomi Networks Guardian
HighCVE-2025-40888: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40887: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.