Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67708: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri ArcGIS Server

0
Medium
VulnerabilityCVE-2025-67708cvecve-2025-67708cwe-79
Published: Wed Dec 31 2025 (12/31/2025, 22:17:08 UTC)
Source: CVE Database V5
Vendor/Project: Esri
Product: ArcGIS Server

Description

There is a stored cross site scripting issue in Esri ArcGIS Server 11.4 and earlier on Windows and Linux that in some configurations allows a remote unauthenticated attacker to store files that contain malicious code that may execute in the context of a victim’s browser.

AI-Powered Analysis

AILast updated: 01/07/2026, 23:38:27 UTC

Technical Analysis

CVE-2025-67708 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79 affecting Esri ArcGIS Server versions 11.4 and earlier, including version 10.9.1, on Windows and Linux platforms. The vulnerability arises from improper neutralization of input during web page generation, allowing attackers to inject malicious scripts into files stored on the server. These scripts execute in the context of a victim's browser when the malicious content is accessed, enabling potential theft of session cookies, user credentials, or execution of unauthorized actions. The attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R), such as visiting a compromised or crafted web page. The vulnerability has a CVSS v3.1 base score of 6.1, indicating medium severity, with impacts on confidentiality and integrity but no impact on availability. No known exploits are currently reported in the wild. The vulnerability affects both Windows and Linux deployments of ArcGIS Server, a widely used platform for GIS services. The flaw can be exploited remotely by unauthenticated attackers, making it a significant risk for organizations exposing ArcGIS Server interfaces to external or internal users. The vulnerability's scope is changed (S:C), meaning it can affect resources beyond the initially vulnerable component. Esri has not yet published patches, so mitigation relies on configuration changes and defensive controls. The vulnerability highlights the importance of secure input handling and output encoding in web applications, especially those serving critical infrastructure and geographic data.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized script execution within user browsers accessing ArcGIS Server web interfaces. Potential impacts include theft of sensitive geographic or user data, session hijacking, and unauthorized actions performed on behalf of legitimate users. Given the use of ArcGIS Server in critical infrastructure sectors such as utilities, transportation, and government mapping services across Europe, exploitation could lead to disruption of services or leakage of sensitive information. The medium severity reflects limited direct system compromise but significant risk to data confidentiality and integrity. Organizations with public-facing or internally accessible ArcGIS Server deployments are at higher risk, especially if users have elevated privileges or access sensitive data. The lack of authentication requirement for exploitation increases the threat surface. However, the need for user interaction reduces the likelihood of automated widespread exploitation. The absence of known exploits in the wild currently lowers immediate risk but does not preclude future attacks. Overall, European entities relying on Esri ArcGIS Server should consider this vulnerability a moderate threat that requires timely mitigation to protect GIS data and services.

Mitigation Recommendations

1. Apply official patches from Esri as soon as they become available to address the vulnerability directly. 2. Until patches are released, restrict file upload capabilities and validate all user inputs rigorously to prevent injection of malicious scripts. 3. Implement strong output encoding and sanitization on all web pages generated by ArcGIS Server to neutralize potentially malicious content. 4. Deploy Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. 5. Limit exposure of ArcGIS Server interfaces to trusted networks and users by using network segmentation and access controls. 6. Monitor web server and application logs for unusual file uploads or script execution attempts. 7. Educate users to avoid clicking on suspicious links or accessing untrusted ArcGIS Server resources. 8. Consider using Web Application Firewalls (WAFs) with rules tuned to detect and block XSS payloads targeting ArcGIS Server. 9. Regularly review and update security configurations and conduct penetration testing focused on web application vulnerabilities. 10. Maintain an incident response plan to quickly address any detected exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Esri
Date Reserved
2025-12-10T17:22:04.790Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6955a3a5db813ff03e04e4a7

Added to database: 12/31/2025, 10:28:53 PM

Last enriched: 1/7/2026, 11:38:27 PM

Last updated: 1/8/2026, 7:22:07 AM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats