A stored cross-site scripting (XSS) vulnerability exists ArcGIS HUB and ArcGIS Enterprise Sites which allows an authenticated user with the ability to create or edit a site to add and store an XSS payload. If this stored XSS payload is triggered by any user attacker supplied JavaScript may execute in the victim's browser.
References
Link | Resource |
---|---|
https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/2925891-2 | Vendor Advisory |
Configurations
History
05 Sep 2025, 15:10
Type | Values Removed | Values Added |
---|---|---|
First Time |
Esri
Esri portal For Arcgis |
|
CPE | cpe:2.3:a:esri:portal_for_arcgis:*:*:*:*:*:*:*:* | |
References | () https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/2925891-2 - Vendor Advisory |
22 Aug 2025, 18:08
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
21 Aug 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-21 20:15
Updated : 2025-09-05 15:10
NVD link : CVE-2025-55104
Mitre link : CVE-2025-55104
CVE.ORG link : CVE-2025-55104
JSON object : View
Products Affected
esri
- portal_for_arcgis
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')