Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67704: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri ArcGIS Server

0
Medium
VulnerabilityCVE-2025-67704cvecve-2025-67704cwe-79
Published: Wed Dec 31 2025 (12/31/2025, 22:14:32 UTC)
Source: CVE Database V5
Vendor/Project: Esri
Product: ArcGIS Server

Description

There is a stored cross site scripting issue in Esri ArcGIS Server 11.4 and earlier on Windows and Linux that in some configurations allows a remote unauthenticated attacker to store files that contain malicious code that may execute in the context of a victim’s browser.

AI-Powered Analysis

AILast updated: 01/07/2026, 23:37:12 UTC

Technical Analysis

CVE-2025-67704 is a stored cross-site scripting vulnerability affecting Esri ArcGIS Server versions 11.4 and earlier, including 10.9.1, on Windows and Linux operating systems. The vulnerability stems from improper neutralization of input during the generation of web pages, allowing an attacker to inject malicious scripts into files stored on the server. When a victim accesses these files via a web browser, the malicious code executes within the victim’s browser context, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The attack vector is remote and requires no authentication, but does require user interaction to trigger the malicious payload. The vulnerability is classified under CWE-79, which covers cross-site scripting issues. The CVSS v3.1 score of 6.1 reflects a medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), scope changed (S:C), and impacts on confidentiality and integrity but not availability (C:L/I:L/A:N). No public exploits have been reported yet, but the vulnerability poses a risk especially in environments where ArcGIS Server is exposed to untrusted users or the internet. The lack of available patches at the time of reporting necessitates immediate mitigation through configuration changes and input sanitization.

Potential Impact

For European organizations, the impact of CVE-2025-67704 can be significant, particularly for public sector agencies, utilities, and enterprises relying on Esri ArcGIS Server for critical geospatial data services. Successful exploitation can lead to unauthorized disclosure of sensitive information (confidentiality impact) and manipulation of data or user sessions (integrity impact). Although availability is not directly affected, the loss of trust and potential data leakage can disrupt operations and lead to regulatory compliance issues under GDPR. Attackers could leverage this vulnerability to conduct phishing campaigns, escalate access, or pivot into internal networks. Organizations with ArcGIS Server instances exposed to external networks or with weak input validation are at higher risk. The medium severity score suggests a moderate but actionable threat that requires timely attention to prevent exploitation.

Mitigation Recommendations

To mitigate CVE-2025-67704, European organizations should: 1) Apply any available patches or updates from Esri as soon as they are released. 2) Implement strict input validation and output encoding on all user-supplied data within ArcGIS Server configurations and custom applications. 3) Restrict access to ArcGIS Server interfaces to trusted networks and authenticated users where possible, reducing exposure to unauthenticated remote attackers. 4) Employ web application firewalls (WAFs) with rules targeting XSS attack patterns to detect and block malicious payloads. 5) Conduct regular security audits and penetration testing focusing on web interface vulnerabilities. 6) Educate users about the risks of interacting with untrusted links or files served by ArcGIS Server. 7) Monitor logs for unusual activity indicative of attempted exploitation. These steps go beyond generic advice by emphasizing configuration hardening, network segmentation, and proactive detection tailored to the ArcGIS Server environment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Esri
Date Reserved
2025-12-10T17:22:04.790Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6955a3a5db813ff03e04e49b

Added to database: 12/31/2025, 10:28:53 PM

Last enriched: 1/7/2026, 11:37:12 PM

Last updated: 1/8/2026, 7:25:07 AM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats