CVE-2025-55104

4.8 MEDIUM

📋 TL;DR

A stored cross-site scripting vulnerability in ArcGIS HUB and ArcGIS Enterprise Sites allows authenticated users with site creation/editing permissions to inject malicious JavaScript that executes in other users' browsers when they view the compromised content. This affects organizations using these ArcGIS products with users who have site management privileges.

💻 Affected Systems

Products:
  • ArcGIS HUB
  • ArcGIS Enterprise Sites
Versions: Specific versions not detailed in reference; check vendor advisory for exact affected versions
Operating Systems: All platforms running affected ArcGIS software
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with site creation/editing permissions; not exploitable by unauthenticated users

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, redirect to malicious sites, or compromise user accounts and data.

🟠

Likely Case

Attackers with legitimate site editing access could embed malicious scripts to steal session tokens or perform limited actions as other users viewing the compromised content.

🟢

If Mitigated

With proper input validation and output encoding, the vulnerability would be prevented, and with least privilege access controls, the attack surface would be minimized.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access with specific permissions; stored XSS payloads persist until removed

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions

Vendor Advisory: https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/2925891-2

Restart Required: No

Instructions:

1. Review the Esri security advisory. 2. Apply the recommended patches or updates for ArcGIS HUB and ArcGIS Enterprise Sites. 3. Verify the update was successful.

🔧 Temporary Workarounds

Restrict Site Editing Permissions

all

Limit site creation and editing capabilities to only trusted, necessary users following least privilege principles

Implement Content Security Policy

all

Deploy CSP headers to restrict script execution sources and reduce XSS impact

🧯 If You Can't Patch

  • Review and audit all site content for suspicious scripts or HTML
  • Implement web application firewall rules to detect and block XSS payloads

🔍 How to Verify

Check if Vulnerable:

Check if your ArcGIS HUB/Enterprise Sites version matches affected versions in the Esri advisory

Check Version:

Check ArcGIS product version through administrative interfaces or configuration files

Verify Fix Applied:

Verify installation of patched versions and test that XSS payloads are properly sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual site editing activity
  • Suspicious HTML/JavaScript in content updates

Network Indicators:

  • Unexpected external script loads from site content

SIEM Query:

Search for patterns of script injection in web application logs or content modification events

🔗 References

📤 Share & Export