Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67712: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri ArcGIS Web AppBuilder {Developer Edition)

0
Medium
VulnerabilityCVE-2025-67712cvecve-2025-67712cwe-79
Published: Fri Dec 19 2025 (12/19/2025, 20:05:42 UTC)
Source: CVE Database V5
Vendor/Project: Esri
Product: ArcGIS Web AppBuilder {Developer Edition)

Description

There is an HTML injection issue in Esri ArcGIS Web AppBuilder developer edition versions prior to 2.30 that allows a remote, unauthenticated attacker to potentially entice a user to click a link that causes arbitrary HTML to render in a victim's browser. There is no evidence of JavaScript execution, which limits the impact. At the time of submission, ArcGIS Web App Builder developer edition is retired and unsupported. ArcGIS Web App Builder 2.30 is not susceptible to this vulnerability.

AI-Powered Analysis

AILast updated: 12/19/2025, 20:39:54 UTC

Technical Analysis

CVE-2025-67712 is an HTML injection vulnerability classified under CWE-79, found in Esri ArcGIS Web AppBuilder Developer Edition versions prior to 2.30. This vulnerability arises from improper neutralization of input during web page generation, allowing an attacker to inject arbitrary HTML content into the rendered page. The flaw can be exploited remotely without authentication by enticing a user to click a crafted link, which then causes the victim's browser to render attacker-controlled HTML. However, the vulnerability does not enable JavaScript execution, which significantly limits the attacker's ability to perform more damaging cross-site scripting (XSS) attacks such as session hijacking or credential theft. The affected product, ArcGIS Web AppBuilder Developer Edition, is retired and unsupported, meaning no official patches are available for these versions. The vulnerability has a CVSS 3.1 base score of 4.7 (medium severity), reflecting its limited impact and ease of exploitation requiring user interaction. The scope is considered changed (S:C) because the injected content could affect other users or components relying on the application. Since version 2.30 is not vulnerable, users are advised to upgrade to this or later versions. No known exploits have been reported in the wild, reducing immediate risk but not eliminating potential future exploitation.

Potential Impact

For European organizations, the impact of CVE-2025-67712 is primarily on the integrity of web content rendered by the affected ArcGIS Web AppBuilder Developer Edition. Attackers could manipulate displayed HTML to mislead users or deface content, potentially damaging organizational reputation or causing confusion. Since no JavaScript execution is possible, risks such as credential theft or session hijacking are minimal. The requirement for user interaction (clicking a malicious link) further limits the threat. However, organizations relying on the Developer Edition for internal or external GIS applications may face risks if attackers exploit this vulnerability to alter displayed information, which could affect decision-making or data interpretation. The lack of vendor support for the affected versions means organizations cannot rely on patches and must consider alternative mitigation strategies. Overall, the threat is moderate but should not be ignored, especially in sectors where GIS data integrity is critical, such as urban planning, environmental monitoring, or emergency services.

Mitigation Recommendations

European organizations should immediately discontinue use of Esri ArcGIS Web AppBuilder Developer Edition versions prior to 2.30, as these are retired and unsupported. Migrating to ArcGIS Web AppBuilder 2.30 or later versions, which are not vulnerable, is the most effective mitigation. If migration is not immediately possible, organizations should implement strict input validation and output encoding on any user-supplied data incorporated into web pages to prevent HTML injection. Additionally, deploying web application firewalls (WAFs) with custom rules to detect and block suspicious HTML injection attempts can reduce risk. User awareness training to avoid clicking suspicious links related to GIS applications is also recommended. Monitoring logs for unusual access patterns or unexpected HTML content rendering can help detect exploitation attempts. Finally, organizations should review their GIS application exposure and restrict public access where feasible to minimize attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Esri
Date Reserved
2025-12-10T17:22:04.791Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6945b49d94037f6b535f8834

Added to database: 12/19/2025, 8:25:01 PM

Last enriched: 12/19/2025, 8:39:54 PM

Last updated: 12/19/2025, 9:44:30 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats