CVE-2025-67710: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri ArcGIS Server
There is a stored cross site scripting issue in Esri ArcGIS Server 11.4 and earlier on Windows and Linux that in some configurations allows a remote unauthenticated attacker to store files that contain malicious code that may execute in the context of a victim’s browser.
AI Analysis
Technical Summary
CVE-2025-67710 is a stored cross-site scripting vulnerability identified in Esri ArcGIS Server versions 11.4 and earlier, including 10.9.1, running on Windows and Linux. The vulnerability stems from improper neutralization of input during web page generation (CWE-79), allowing attackers to inject malicious scripts into stored files or data that are later rendered by the server. Because the vulnerability is stored XSS, the malicious payload persists on the server and executes in the browsers of users who access the compromised content. Notably, the attack vector requires no authentication, meaning any remote attacker can exploit this flaw if the server is accessible. However, user interaction is required for the malicious script to execute, typically when a victim accesses the infected page or resource. The CVSS v3.1 score of 6.1 reflects a medium severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact affects confidentiality and integrity to a limited extent (C:L, I:L), with no impact on availability (A:N). Although no known exploits are reported in the wild, the vulnerability poses a risk to organizations that expose ArcGIS Server interfaces to users, especially in environments where GIS data is shared with external or untrusted parties. Attackers could leverage this vulnerability to steal session tokens, perform actions on behalf of users, or deliver further malware via the victim's browser context. The vulnerability affects both Windows and Linux deployments, increasing the scope of affected systems. Since ArcGIS Server is widely used in government, utilities, transportation, and environmental sectors, the impact could extend to critical infrastructure and public services. The lack of available patches at the time of publication necessitates immediate mitigation through configuration hardening and monitoring.
Potential Impact
For European organizations, the impact of CVE-2025-67710 can be significant, particularly for those relying on Esri ArcGIS Server for critical GIS services. The vulnerability enables attackers to execute malicious scripts in the browsers of users accessing compromised content, potentially leading to theft of sensitive geographic data, session hijacking, or unauthorized actions performed with user privileges. This can undermine the confidentiality and integrity of GIS data, which is often used for urban planning, emergency response, transportation management, and environmental monitoring. In sectors such as government agencies, utilities, and transportation authorities, exploitation could disrupt decision-making processes or expose sensitive infrastructure information. Although availability is not directly impacted, the reputational damage and potential regulatory consequences from data breaches or unauthorized access could be substantial. The fact that no authentication is required for exploitation increases the risk, especially if ArcGIS Server instances are publicly accessible or insufficiently segmented. European organizations must consider the potential for targeted attacks by threat actors interested in geographic intelligence or disruption of critical services. The medium severity rating suggests a moderate but non-trivial risk that should be addressed promptly to avoid escalation or chaining with other vulnerabilities.
Mitigation Recommendations
1. Apply official patches or updates from Esri as soon as they become available to address CVE-2025-67710. 2. Until patches are released, restrict access to ArcGIS Server management and content interfaces by implementing network segmentation, VPNs, or IP whitelisting to limit exposure to trusted users only. 3. Implement strict input validation and output encoding on all user-supplied data fields within ArcGIS Server configurations and custom web applications to prevent injection of malicious scripts. 4. Enable Content Security Policy (CSP) headers on web servers hosting ArcGIS Server to restrict the execution of unauthorized scripts in browsers. 5. Monitor server logs and web traffic for unusual or suspicious requests that may indicate attempts to exploit stored XSS. 6. Educate users to recognize and report unexpected browser behavior or unusual prompts when interacting with GIS portals. 7. Conduct regular security assessments and penetration testing focused on web application vulnerabilities in GIS infrastructure. 8. Consider deploying Web Application Firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting ArcGIS Server endpoints. 9. Review and minimize the use of stored files or data inputs that accept user-generated content to reduce attack surface. 10. Maintain an incident response plan that includes procedures for handling XSS incidents and potential data compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-67710: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri ArcGIS Server
Description
There is a stored cross site scripting issue in Esri ArcGIS Server 11.4 and earlier on Windows and Linux that in some configurations allows a remote unauthenticated attacker to store files that contain malicious code that may execute in the context of a victim’s browser.
AI-Powered Analysis
Technical Analysis
CVE-2025-67710 is a stored cross-site scripting vulnerability identified in Esri ArcGIS Server versions 11.4 and earlier, including 10.9.1, running on Windows and Linux. The vulnerability stems from improper neutralization of input during web page generation (CWE-79), allowing attackers to inject malicious scripts into stored files or data that are later rendered by the server. Because the vulnerability is stored XSS, the malicious payload persists on the server and executes in the browsers of users who access the compromised content. Notably, the attack vector requires no authentication, meaning any remote attacker can exploit this flaw if the server is accessible. However, user interaction is required for the malicious script to execute, typically when a victim accesses the infected page or resource. The CVSS v3.1 score of 6.1 reflects a medium severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact affects confidentiality and integrity to a limited extent (C:L, I:L), with no impact on availability (A:N). Although no known exploits are reported in the wild, the vulnerability poses a risk to organizations that expose ArcGIS Server interfaces to users, especially in environments where GIS data is shared with external or untrusted parties. Attackers could leverage this vulnerability to steal session tokens, perform actions on behalf of users, or deliver further malware via the victim's browser context. The vulnerability affects both Windows and Linux deployments, increasing the scope of affected systems. Since ArcGIS Server is widely used in government, utilities, transportation, and environmental sectors, the impact could extend to critical infrastructure and public services. The lack of available patches at the time of publication necessitates immediate mitigation through configuration hardening and monitoring.
Potential Impact
For European organizations, the impact of CVE-2025-67710 can be significant, particularly for those relying on Esri ArcGIS Server for critical GIS services. The vulnerability enables attackers to execute malicious scripts in the browsers of users accessing compromised content, potentially leading to theft of sensitive geographic data, session hijacking, or unauthorized actions performed with user privileges. This can undermine the confidentiality and integrity of GIS data, which is often used for urban planning, emergency response, transportation management, and environmental monitoring. In sectors such as government agencies, utilities, and transportation authorities, exploitation could disrupt decision-making processes or expose sensitive infrastructure information. Although availability is not directly impacted, the reputational damage and potential regulatory consequences from data breaches or unauthorized access could be substantial. The fact that no authentication is required for exploitation increases the risk, especially if ArcGIS Server instances are publicly accessible or insufficiently segmented. European organizations must consider the potential for targeted attacks by threat actors interested in geographic intelligence or disruption of critical services. The medium severity rating suggests a moderate but non-trivial risk that should be addressed promptly to avoid escalation or chaining with other vulnerabilities.
Mitigation Recommendations
1. Apply official patches or updates from Esri as soon as they become available to address CVE-2025-67710. 2. Until patches are released, restrict access to ArcGIS Server management and content interfaces by implementing network segmentation, VPNs, or IP whitelisting to limit exposure to trusted users only. 3. Implement strict input validation and output encoding on all user-supplied data fields within ArcGIS Server configurations and custom web applications to prevent injection of malicious scripts. 4. Enable Content Security Policy (CSP) headers on web servers hosting ArcGIS Server to restrict the execution of unauthorized scripts in browsers. 5. Monitor server logs and web traffic for unusual or suspicious requests that may indicate attempts to exploit stored XSS. 6. Educate users to recognize and report unexpected browser behavior or unusual prompts when interacting with GIS portals. 7. Conduct regular security assessments and penetration testing focused on web application vulnerabilities in GIS infrastructure. 8. Consider deploying Web Application Firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting ArcGIS Server endpoints. 9. Review and minimize the use of stored files or data inputs that accept user-generated content to reduce attack surface. 10. Maintain an incident response plan that includes procedures for handling XSS incidents and potential data compromise.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Esri
- Date Reserved
- 2025-12-10T17:22:04.790Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6955a3a5db813ff03e04e4ad
Added to database: 12/31/2025, 10:28:53 PM
Last enriched: 1/7/2026, 11:42:30 PM
Last updated: 1/8/2026, 7:22:40 AM
Views: 41
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0700: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2025-13679: CWE-862 Missing Authorization in themeum Tutor LMS – eLearning and online course solution
MediumCVE-2026-0699: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2026-0698: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2026-0697: SQL Injection in code-projects Intern Membership Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.