CVE-2025-67708
Stored XSS in Esri ArcGIS Server Allows Remote Code Execution
Publication date: 2025-12-31
Last updated on: 2025-12-31
Assigner: Environmental Systems Research Institute, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| esri | arcgis_server | 11.4 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a stored cross-site scripting (XSS) issue in Esri ArcGIS Server 11.4 and earlier versions on Windows and Linux. It allows a remote unauthenticated attacker, under certain configurations, to store files containing malicious code. This malicious code can then execute in the context of a victim's browser when they access the affected content.
How can this vulnerability impact me? :
The vulnerability can impact you by allowing attackers to execute malicious scripts in the browsers of users who access the compromised content. This can lead to theft of sensitive information, session hijacking, or other malicious actions performed on behalf of the victim user.