A stored cross-site scripting (XSS) vulnerability exists ArcGIS HUB and ArcGIS Enterprise Sites which allows an authenticated user with the ability to create or edit a site to add and store an XSS payload. If this stored XSS payload is triggered by any user attacker supplied JavaScript may execute in the victim's browser.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/2925891-2 | Vendor Advisory | 
Configurations
                    History
                    05 Sep 2025, 15:10
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:a:esri:portal_for_arcgis:*:*:*:*:*:*:*:* | |
| First Time | Esri portal For Arcgis Esri | |
| References | () https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/2925891-2 - Vendor Advisory | 
22 Aug 2025, 18:08
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
21 Aug 2025, 20:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-08-21 20:15
Updated : 2025-09-05 15:10
NVD link : CVE-2025-55104
Mitre link : CVE-2025-55104
CVE.ORG link : CVE-2025-55104
JSON object : View
Products Affected
                esri
- portal_for_arcgis
CWE
                
                    
                        
                        CWE-79
                        
            Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
