CVE-2025-67708: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri ArcGIS Server
There is a stored cross site scripting issue in Esri ArcGIS Server 11.4 and earlier on Windows and Linux that in some configurations allows a remote unauthenticated attacker to store files that contain malicious code that may execute in the context of a victim’s browser.
AI Analysis
Technical Summary
CVE-2025-67708 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79 affecting Esri ArcGIS Server versions 11.4 and earlier, including version 10.9.1, on Windows and Linux platforms. The vulnerability arises from improper neutralization of input during web page generation, allowing attackers to inject malicious scripts into files stored on the server. These scripts execute in the context of a victim's browser when the malicious content is accessed, enabling potential theft of session cookies, user credentials, or execution of unauthorized actions. The attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R), such as visiting a compromised or crafted web page. The vulnerability has a CVSS v3.1 base score of 6.1, indicating medium severity, with impacts on confidentiality and integrity but no impact on availability. No known exploits are currently reported in the wild. The vulnerability affects both Windows and Linux deployments of ArcGIS Server, a widely used platform for GIS services. The flaw can be exploited remotely by unauthenticated attackers, making it a significant risk for organizations exposing ArcGIS Server interfaces to external or internal users. The vulnerability's scope is changed (S:C), meaning it can affect resources beyond the initially vulnerable component. Esri has not yet published patches, so mitigation relies on configuration changes and defensive controls. The vulnerability highlights the importance of secure input handling and output encoding in web applications, especially those serving critical infrastructure and geographic data.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized script execution within user browsers accessing ArcGIS Server web interfaces. Potential impacts include theft of sensitive geographic or user data, session hijacking, and unauthorized actions performed on behalf of legitimate users. Given the use of ArcGIS Server in critical infrastructure sectors such as utilities, transportation, and government mapping services across Europe, exploitation could lead to disruption of services or leakage of sensitive information. The medium severity reflects limited direct system compromise but significant risk to data confidentiality and integrity. Organizations with public-facing or internally accessible ArcGIS Server deployments are at higher risk, especially if users have elevated privileges or access sensitive data. The lack of authentication requirement for exploitation increases the threat surface. However, the need for user interaction reduces the likelihood of automated widespread exploitation. The absence of known exploits in the wild currently lowers immediate risk but does not preclude future attacks. Overall, European entities relying on Esri ArcGIS Server should consider this vulnerability a moderate threat that requires timely mitigation to protect GIS data and services.
Mitigation Recommendations
1. Apply official patches from Esri as soon as they become available to address the vulnerability directly. 2. Until patches are released, restrict file upload capabilities and validate all user inputs rigorously to prevent injection of malicious scripts. 3. Implement strong output encoding and sanitization on all web pages generated by ArcGIS Server to neutralize potentially malicious content. 4. Deploy Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. 5. Limit exposure of ArcGIS Server interfaces to trusted networks and users by using network segmentation and access controls. 6. Monitor web server and application logs for unusual file uploads or script execution attempts. 7. Educate users to avoid clicking on suspicious links or accessing untrusted ArcGIS Server resources. 8. Consider using Web Application Firewalls (WAFs) with rules tuned to detect and block XSS payloads targeting ArcGIS Server. 9. Regularly review and update security configurations and conduct penetration testing focused on web application vulnerabilities. 10. Maintain an incident response plan to quickly address any detected exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-67708: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri ArcGIS Server
Description
There is a stored cross site scripting issue in Esri ArcGIS Server 11.4 and earlier on Windows and Linux that in some configurations allows a remote unauthenticated attacker to store files that contain malicious code that may execute in the context of a victim’s browser.
AI-Powered Analysis
Technical Analysis
CVE-2025-67708 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79 affecting Esri ArcGIS Server versions 11.4 and earlier, including version 10.9.1, on Windows and Linux platforms. The vulnerability arises from improper neutralization of input during web page generation, allowing attackers to inject malicious scripts into files stored on the server. These scripts execute in the context of a victim's browser when the malicious content is accessed, enabling potential theft of session cookies, user credentials, or execution of unauthorized actions. The attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R), such as visiting a compromised or crafted web page. The vulnerability has a CVSS v3.1 base score of 6.1, indicating medium severity, with impacts on confidentiality and integrity but no impact on availability. No known exploits are currently reported in the wild. The vulnerability affects both Windows and Linux deployments of ArcGIS Server, a widely used platform for GIS services. The flaw can be exploited remotely by unauthenticated attackers, making it a significant risk for organizations exposing ArcGIS Server interfaces to external or internal users. The vulnerability's scope is changed (S:C), meaning it can affect resources beyond the initially vulnerable component. Esri has not yet published patches, so mitigation relies on configuration changes and defensive controls. The vulnerability highlights the importance of secure input handling and output encoding in web applications, especially those serving critical infrastructure and geographic data.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized script execution within user browsers accessing ArcGIS Server web interfaces. Potential impacts include theft of sensitive geographic or user data, session hijacking, and unauthorized actions performed on behalf of legitimate users. Given the use of ArcGIS Server in critical infrastructure sectors such as utilities, transportation, and government mapping services across Europe, exploitation could lead to disruption of services or leakage of sensitive information. The medium severity reflects limited direct system compromise but significant risk to data confidentiality and integrity. Organizations with public-facing or internally accessible ArcGIS Server deployments are at higher risk, especially if users have elevated privileges or access sensitive data. The lack of authentication requirement for exploitation increases the threat surface. However, the need for user interaction reduces the likelihood of automated widespread exploitation. The absence of known exploits in the wild currently lowers immediate risk but does not preclude future attacks. Overall, European entities relying on Esri ArcGIS Server should consider this vulnerability a moderate threat that requires timely mitigation to protect GIS data and services.
Mitigation Recommendations
1. Apply official patches from Esri as soon as they become available to address the vulnerability directly. 2. Until patches are released, restrict file upload capabilities and validate all user inputs rigorously to prevent injection of malicious scripts. 3. Implement strong output encoding and sanitization on all web pages generated by ArcGIS Server to neutralize potentially malicious content. 4. Deploy Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. 5. Limit exposure of ArcGIS Server interfaces to trusted networks and users by using network segmentation and access controls. 6. Monitor web server and application logs for unusual file uploads or script execution attempts. 7. Educate users to avoid clicking on suspicious links or accessing untrusted ArcGIS Server resources. 8. Consider using Web Application Firewalls (WAFs) with rules tuned to detect and block XSS payloads targeting ArcGIS Server. 9. Regularly review and update security configurations and conduct penetration testing focused on web application vulnerabilities. 10. Maintain an incident response plan to quickly address any detected exploitation attempts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Esri
- Date Reserved
- 2025-12-10T17:22:04.790Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6955a3a5db813ff03e04e4a7
Added to database: 12/31/2025, 10:28:53 PM
Last enriched: 1/7/2026, 11:38:27 PM
Last updated: 1/8/2026, 7:22:07 AM
Views: 30
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0700: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2025-13679: CWE-862 Missing Authorization in themeum Tutor LMS – eLearning and online course solution
MediumCVE-2026-0699: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2026-0698: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2026-0697: SQL Injection in code-projects Intern Membership Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.