CVE-2025-67705

Source: psirt@esri.com

MEDIUM
6.1
Published: December 31, 2025 at 11:15 PM
Modified: January 6, 2026 at 07:09 PM

Vulnerability Description

There is a stored cross site scripting issue in Esri ArcGIS Server 11.4 and earlier on Windows and Linux that in some configurations allows a remote unauthenticated attacker to store files that contain malicious code that may execute in the context of a victim’s browser.

CVSS Metrics

Base Score
6.1
Severity
MEDIUM
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Weaknesses (CWE)

Source: psirt@esri.com

AI Security Analysis

01 // Technical Summary

Esri ArcGIS Server 11.4 and earlier is vulnerable to a stored cross-site scripting (XSS) attack, allowing unauthenticated attackers to inject malicious code into the server. This vulnerability enables attackers to compromise user browsers, potentially leading to account takeover and data exfiltration.

02 // Vulnerability Mechanism

Step 1: Payload Creation: The attacker crafts a malicious file (e.g., an HTML file, a JavaScript file, or a file containing JavaScript code) containing a JavaScript payload designed to execute in a victim's browser. This payload could be designed to steal cookies, redirect the user, or perform other malicious actions.

Step 2: File Upload: The attacker leverages a configuration vulnerability within ArcGIS Server to upload the malicious file to a location accessible by other users. This might involve exploiting a file upload feature or a misconfigured directory.

Step 3: Payload Storage: The ArcGIS Server stores the uploaded file without proper sanitization or encoding of the JavaScript payload.

Step 4: Victim Interaction: A legitimate user accesses a web page or feature within ArcGIS Server that renders or displays the uploaded file. This could be through a map, a report, or another feature that incorporates user-uploaded content.

Step 5: Payload Execution: The victim's browser executes the malicious JavaScript code embedded within the uploaded file. The code runs within the context of the ArcGIS Server domain, allowing the attacker to perform actions on behalf of the victim.

03 // Deep Technical Analysis

The vulnerability stems from insufficient input validation and sanitization of user-supplied data when storing files within the ArcGIS Server environment. Specifically, the server fails to properly filter or encode potentially malicious JavaScript code embedded within uploaded files. When a victim subsequently accesses a web page that renders these stored files, the malicious script executes within the victim's browser context, enabling the attacker to perform actions on behalf of the user. The root cause is a lack of proper input validation and output encoding on the server-side, allowing for the storage of malicious payloads that are later rendered without proper sanitization. This allows for the execution of arbitrary JavaScript code within the context of the ArcGIS Server domain.

04 // Exploitation Status

Likely **Public PoC** and **Actively exploited**. Given the nature of the vulnerability (stored XSS) and the widespread use of ArcGIS Server, it is highly probable that proof-of-concept exploits are available and that attackers are actively targeting vulnerable installations.

05 // Threat Intelligence

Likely targeted by various threat actors, including those seeking to compromise geospatial data and infrastructure. APT groups known for targeting government and critical infrastructure are likely to exploit this vulnerability. CISA KEV status is highly probable given the severity and ease of exploitation.

06 // Detection & Hunting

  • Monitor server logs for suspicious file uploads, especially those with unusual file extensions or content.

  • Analyze network traffic for unusual HTTP requests or responses containing JavaScript code.

  • Implement a Web Application Firewall (WAF) with rules to detect and block XSS attempts.

  • Monitor for changes to files stored on the ArcGIS Server, especially those related to web content.

  • Use a security information and event management (SIEM) system to correlate events and identify potential attacks.

07 // Remediation & Hardening

  • Upgrade ArcGIS Server to version 11.5 or later, which includes a fix for this vulnerability.

  • Implement robust input validation and output encoding to sanitize user-supplied data before storing it.

  • Configure the server to restrict file upload types and sizes.

  • Regularly scan the server for vulnerabilities and apply security patches promptly.

  • Implement a Web Application Firewall (WAF) to filter malicious requests.

  • Review and harden the server's configuration to minimize attack surface.

  • Implement a content security policy (CSP) to restrict the execution of JavaScript code.

08 // Affected Products

Esri ArcGIS Server 11.4Esri ArcGIS Server 11.3Esri ArcGIS Server 11.2Esri ArcGIS Server 11.1Esri ArcGIS Server 11.0Esri ArcGIS Server 10.9.1Esri ArcGIS Server 10.9Esri ArcGIS Server 10.8.1Esri ArcGIS Server 10.8Esri ArcGIS Server 10.7.1Esri ArcGIS Server 10.7Esri ArcGIS Server 10.6.1Esri ArcGIS Server 10.6Esri ArcGIS Server 10.5.1Esri ArcGIS Server 10.5Esri ArcGIS Server 10.4.1Esri ArcGIS Server 10.4Esri ArcGIS Server 10.3.1Esri ArcGIS Server 10.3Esri ArcGIS Server 10.2.2Esri ArcGIS Server 10.2.1Esri ArcGIS Server 10.2Esri ArcGIS Server 10.1 SP1Esri ArcGIS Server 10.1Esri ArcGIS Server 10.0
Advertisement