CVE-2025-67712: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri ArcGIS Web AppBuilder {Developer Edition)
There is an HTML injection issue in Esri ArcGIS Web AppBuilder developer edition versions prior to 2.30 that allows a remote, unauthenticated attacker to potentially entice a user to click a link that causes arbitrary HTML to render in a victim's browser. There is no evidence of JavaScript execution, which limits the impact. At the time of submission, ArcGIS Web App Builder developer edition is retired and unsupported. ArcGIS Web App Builder 2.30 is not susceptible to this vulnerability.
AI Analysis
Technical Summary
CVE-2025-67712 is an HTML injection vulnerability classified under CWE-79, found in Esri ArcGIS Web AppBuilder Developer Edition versions prior to 2.30. This vulnerability arises from improper neutralization of input during web page generation, allowing an attacker to inject arbitrary HTML content into the rendered page. The flaw can be exploited remotely without authentication by enticing a user to click a crafted link, which then causes the victim's browser to render attacker-controlled HTML. However, the vulnerability does not enable JavaScript execution, which significantly limits the attacker's ability to perform more damaging cross-site scripting (XSS) attacks such as session hijacking or credential theft. The affected product, ArcGIS Web AppBuilder Developer Edition, is retired and unsupported, meaning no official patches are available for these versions. The vulnerability has a CVSS 3.1 base score of 4.7 (medium severity), reflecting its limited impact and ease of exploitation requiring user interaction. The scope is considered changed (S:C) because the injected content could affect other users or components relying on the application. Since version 2.30 is not vulnerable, users are advised to upgrade to this or later versions. No known exploits have been reported in the wild, reducing immediate risk but not eliminating potential future exploitation.
Potential Impact
For European organizations, the impact of CVE-2025-67712 is primarily on the integrity of web content rendered by the affected ArcGIS Web AppBuilder Developer Edition. Attackers could manipulate displayed HTML to mislead users or deface content, potentially damaging organizational reputation or causing confusion. Since no JavaScript execution is possible, risks such as credential theft or session hijacking are minimal. The requirement for user interaction (clicking a malicious link) further limits the threat. However, organizations relying on the Developer Edition for internal or external GIS applications may face risks if attackers exploit this vulnerability to alter displayed information, which could affect decision-making or data interpretation. The lack of vendor support for the affected versions means organizations cannot rely on patches and must consider alternative mitigation strategies. Overall, the threat is moderate but should not be ignored, especially in sectors where GIS data integrity is critical, such as urban planning, environmental monitoring, or emergency services.
Mitigation Recommendations
European organizations should immediately discontinue use of Esri ArcGIS Web AppBuilder Developer Edition versions prior to 2.30, as these are retired and unsupported. Migrating to ArcGIS Web AppBuilder 2.30 or later versions, which are not vulnerable, is the most effective mitigation. If migration is not immediately possible, organizations should implement strict input validation and output encoding on any user-supplied data incorporated into web pages to prevent HTML injection. Additionally, deploying web application firewalls (WAFs) with custom rules to detect and block suspicious HTML injection attempts can reduce risk. User awareness training to avoid clicking suspicious links related to GIS applications is also recommended. Monitoring logs for unusual access patterns or unexpected HTML content rendering can help detect exploitation attempts. Finally, organizations should review their GIS application exposure and restrict public access where feasible to minimize attack surface.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-67712: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri ArcGIS Web AppBuilder {Developer Edition)
Description
There is an HTML injection issue in Esri ArcGIS Web AppBuilder developer edition versions prior to 2.30 that allows a remote, unauthenticated attacker to potentially entice a user to click a link that causes arbitrary HTML to render in a victim's browser. There is no evidence of JavaScript execution, which limits the impact. At the time of submission, ArcGIS Web App Builder developer edition is retired and unsupported. ArcGIS Web App Builder 2.30 is not susceptible to this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2025-67712 is an HTML injection vulnerability classified under CWE-79, found in Esri ArcGIS Web AppBuilder Developer Edition versions prior to 2.30. This vulnerability arises from improper neutralization of input during web page generation, allowing an attacker to inject arbitrary HTML content into the rendered page. The flaw can be exploited remotely without authentication by enticing a user to click a crafted link, which then causes the victim's browser to render attacker-controlled HTML. However, the vulnerability does not enable JavaScript execution, which significantly limits the attacker's ability to perform more damaging cross-site scripting (XSS) attacks such as session hijacking or credential theft. The affected product, ArcGIS Web AppBuilder Developer Edition, is retired and unsupported, meaning no official patches are available for these versions. The vulnerability has a CVSS 3.1 base score of 4.7 (medium severity), reflecting its limited impact and ease of exploitation requiring user interaction. The scope is considered changed (S:C) because the injected content could affect other users or components relying on the application. Since version 2.30 is not vulnerable, users are advised to upgrade to this or later versions. No known exploits have been reported in the wild, reducing immediate risk but not eliminating potential future exploitation.
Potential Impact
For European organizations, the impact of CVE-2025-67712 is primarily on the integrity of web content rendered by the affected ArcGIS Web AppBuilder Developer Edition. Attackers could manipulate displayed HTML to mislead users or deface content, potentially damaging organizational reputation or causing confusion. Since no JavaScript execution is possible, risks such as credential theft or session hijacking are minimal. The requirement for user interaction (clicking a malicious link) further limits the threat. However, organizations relying on the Developer Edition for internal or external GIS applications may face risks if attackers exploit this vulnerability to alter displayed information, which could affect decision-making or data interpretation. The lack of vendor support for the affected versions means organizations cannot rely on patches and must consider alternative mitigation strategies. Overall, the threat is moderate but should not be ignored, especially in sectors where GIS data integrity is critical, such as urban planning, environmental monitoring, or emergency services.
Mitigation Recommendations
European organizations should immediately discontinue use of Esri ArcGIS Web AppBuilder Developer Edition versions prior to 2.30, as these are retired and unsupported. Migrating to ArcGIS Web AppBuilder 2.30 or later versions, which are not vulnerable, is the most effective mitigation. If migration is not immediately possible, organizations should implement strict input validation and output encoding on any user-supplied data incorporated into web pages to prevent HTML injection. Additionally, deploying web application firewalls (WAFs) with custom rules to detect and block suspicious HTML injection attempts can reduce risk. User awareness training to avoid clicking suspicious links related to GIS applications is also recommended. Monitoring logs for unusual access patterns or unexpected HTML content rendering can help detect exploitation attempts. Finally, organizations should review their GIS application exposure and restrict public access where feasible to minimize attack surface.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Esri
- Date Reserved
- 2025-12-10T17:22:04.791Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6945b49d94037f6b535f8834
Added to database: 12/19/2025, 8:25:01 PM
Last enriched: 12/19/2025, 8:39:54 PM
Last updated: 12/19/2025, 9:44:30 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-53959: Uncontrolled Search Path Element in filezilla-project FileZilla Client
HighCVE-2023-53958: Weak Password Recovery Mechanism for Forgotten Password in ltb-project LDAP Tool Box Self Service Password
HighCVE-2023-53956: Unrestricted Upload of File with Dangerous Type in altervista flatnux
HighCVE-2023-53951: Improper Verification of Cryptographic Signature in Gauzy ever gauzy
CriticalCVE-2023-53950: Unrestricted Upload of File with Dangerous Type in innovastudio WYSIWYG Editor
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.