Skip to main content

CVE-2025-57877: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri Portal for ArcGIS

Medium
VulnerabilityCVE-2025-57877cvecve-2025-57877cwe-79
Published: Mon Sep 29 2025 (09/29/2025, 18:34:59 UTC)
Source: CVE Database V5
Vendor/Project: Esri
Product: Portal for ArcGIS

Description

There is a reflected cross site scripting vulnerability in Esri Portal for ArcGIS 11.4 and below that may allow a remote authenticated attacker with administrative access to supply a crafted string which would execute arbitrary JavaScript code in the browser.

AI-Powered Analysis

AILast updated: 09/29/2025, 18:42:19 UTC

Technical Analysis

CVE-2025-57877 is a reflected Cross-Site Scripting (XSS) vulnerability identified in Esri Portal for ArcGIS versions 11.4 and below, including version 10.9.1. This vulnerability arises due to improper neutralization of input during web page generation (CWE-79), allowing an attacker to inject malicious JavaScript code into the web application. Specifically, a remote attacker with authenticated administrative privileges can supply crafted input that is reflected in the web interface without adequate sanitization or encoding. When this malicious input is rendered in the victim's browser, it executes arbitrary JavaScript code within the security context of the Portal for ArcGIS web application. The vulnerability requires both authentication with high privileges and user interaction (the administrator must trigger the malicious input). The CVSS v3.1 base score is 4.8 (medium severity), reflecting the limited scope due to required privileges and user interaction, but also the potential for confidentiality and integrity impacts. The vulnerability does not affect availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is significant because Portal for ArcGIS is a widely used geographic information system (GIS) platform that supports critical infrastructure, urban planning, and environmental monitoring. Exploitation could lead to session hijacking, unauthorized actions, or data leakage within the GIS portal environment.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to those using Esri Portal for ArcGIS for managing sensitive geospatial data. The ability for an authenticated administrator to execute arbitrary JavaScript could lead to theft of session tokens, manipulation of GIS data, or unauthorized administrative actions. Given the critical role of GIS in sectors such as utilities, transportation, defense, and urban planning across Europe, exploitation could compromise the confidentiality and integrity of sensitive spatial data and operational workflows. While the attack requires administrative access, insider threats or compromised credentials could enable exploitation. The reflected XSS could also be leveraged as a stepping stone for further attacks within the network. However, the requirement for authentication and user interaction limits the attack surface, reducing the likelihood of widespread automated exploitation. Organizations handling critical infrastructure or government geospatial data should consider this vulnerability a significant concern due to the potential impact on data integrity and confidentiality.

Mitigation Recommendations

To mitigate CVE-2025-57877, European organizations should: 1) Immediately review and restrict administrative access to Portal for ArcGIS, enforcing the principle of least privilege and strong authentication mechanisms such as multi-factor authentication (MFA). 2) Implement rigorous input validation and output encoding on all user-supplied data within the Portal for ArcGIS environment, especially for administrative interfaces. 3) Monitor and audit administrative activities and web application logs for unusual or suspicious input patterns that could indicate attempted exploitation. 4) Apply any available patches or updates from Esri promptly once released. 5) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. 6) Educate administrators on the risks of reflected XSS and the importance of cautious handling of URLs or input fields that may be manipulated. 7) Consider deploying Web Application Firewalls (WAFs) with rules tailored to detect and block reflected XSS payloads targeting Portal for ArcGIS. These measures, combined, will reduce the risk of exploitation and limit the potential damage from successful attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Esri
Date Reserved
2025-08-21T19:31:58.713Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68dad2d15387373ba0f2cb1f

Added to database: 9/29/2025, 6:41:21 PM

Last enriched: 9/29/2025, 6:42:19 PM

Last updated: 10/3/2025, 5:30:16 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats