There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS 11.4 and below that may allow a remote, authenticated attacker to inject malicious a file with an embedded xss script which when loaded could potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high. The attack could disclose a privileged token which may result in the attacker gaining full control of the Portal.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 29 Sep 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 29 Sep 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS 11.4 and below that may allow a remote, authenticated attacker to inject malicious a file with an embedded xss script which when loaded could potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high. The attack could disclose a privileged token which may result in the attacker gaining full control of the Portal. | |
Title | Stored XSS vulnerability in Portal for ArcGIS | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Esri
Published:
Updated: 2025-09-29T19:52:16.857Z
Reserved: 2025-08-21T19:31:58.713Z
Link: CVE-2025-57876

Updated: 2025-09-29T19:52:13.435Z

Status : Awaiting Analysis
Published: 2025-09-29T19:15:36.720
Modified: 2025-09-29T19:34:10.030
Link: CVE-2025-57876

No data.

No data.