CVE-2025-67707
Unknown
Unknown - Not Provided
Arbitrary File Upload Vulnerability in ArcGIS Server 11.5 and Earlier
Publication date: 2025-12-31
Last updated on: 2026-02-20
Assigner: Environmental Systems Research Institute, Inc.
Description
Description
ArcGIS Server versions 11.5 and earlier on Windows and Linux do not sufficiently validate uploaded files, enabling a remote unauthenticated attacker to upload arbitrary files to the server’s designated upload directories.
However, the server’s architecture enforces controls that restrict uploaded files to non‑executable storage locations and prevent modification or replacement of existing application components or system configurations. Uploaded files cannot be executed, leveraged to escalate privileges, or used to access sensitive data.
Because the issue does not enable execution, service disruption, unauthorized access, or integrity compromise, its impact on confidentiality, integrity, and availability is low. Note that race conditions, secret values, or man‑in‑the‑middle conditions are required for exploitation.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| esri | arcgis_server | 11.5 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-434 | The product allows the upload or transfer of dangerous file types that are automatically processed within its environment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in ArcGIS Server version 11.5 and earlier on Windows and Linux. It occurs because the server does not properly validate uploaded files, which allows remote attackers to upload arbitrary files to the system.
How can this vulnerability impact me? :
The vulnerability can allow remote attackers to upload arbitrary files, potentially leading to unauthorized access, data modification, or disruption of service. This could compromise the integrity, confidentiality, and availability of the affected system.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70