CVE-2025-57870
ArcGIS Server vulnerability analysis and mitigation

Overview

A SQL Injection vulnerability exists in Esri ArcGIS Server versions 11.3, 11.4 and 11.5 on Windows, Linux and Kubernetes platforms. The vulnerability was discovered and disclosed on October 22, 2025, identified as CVE-2025-57870. This critical vulnerability allows remote, unauthenticated attackers to execute arbitrary SQL commands via a specific ArcGIS Feature Service operation (NVD).

Technical details

The vulnerability is classified as CWE-89 (Improper Neutralization of Special Elements used in an SQL Command) and has received the highest possible severity ratings with CVSS v4.0 Base Score of 10 and CVSS v3.1 Base Score of 10 (CRITICAL). The vulnerability vector is CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H, indicating network accessibility, low attack complexity, and no required privileges or user interaction (NVD, Esri Blog).

Impact

Successful exploitation of this vulnerability can potentially result in unauthorized access, modification, or deletion of data from the underlying Enterprise Geodatabase. The vulnerability affects feature services that don't utilize hosted feature layers (NVD, Esri Blog).

Mitigation and workarounds

Esri has released a critical security patch that should be applied within two weeks of the October 7, 2025 release date. The patch is non-cumulative, meaning other applicable security patches should be applied first. Additionally, Esri recommends implementing a Web Application Firewall (WAF) for Internet-facing systems, with updated WAF rules (Version 2.2.3) that provide expanded coverage of both Get and Post requests. For customers using ArcGIS Enterprise on Kubernetes 11.3 or 11.4, upgrading to ArcGIS Enterprise 11.5 on Kubernetes is recommended as no patch will be provided for earlier versions (Esri Blog).

Additional resources


SourceThis report was generated using AI

Related ArcGIS Server vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-57870CRITICAL10
  • ArcGIS ServerArcGIS Server
  • cpe:2.3:a:esri:arcgis_server
NoYesOct 22, 2025
CVE-2024-51962CRITICAL9.6
  • ArcGIS ServerArcGIS Server
  • cpe:2.3:a:esri:arcgis_server
NoYesMar 03, 2025
CVE-2024-51966MEDIUM4.9
  • ArcGIS ServerArcGIS Server
  • cpe:2.3:a:esri:arcgis_server
NoYesMar 03, 2025
CVE-2024-5888MEDIUM4.8
  • ArcGIS ServerArcGIS Server
  • cpe:2.3:a:esri:arcgis_server
NoYesMar 03, 2025
CVE-2024-51963MEDIUM4.8
  • ArcGIS ServerArcGIS Server
  • cpe:2.3:a:esri:arcgis_server
NoYesMar 03, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management