CVE-2025-57870
Published: 22 October 2025
Summary
CVE-2025-57870 is a critical-severity SQL Injection (CWE-89) vulnerability in Esri Arcgis Server. Its CVSS base score is 10.0 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 37.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AU-12 (Audit Record Generation) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Timely flaw remediation through application of Esri's security patch directly eliminates the SQL injection vulnerability in the ArcGIS Feature Service operation.
Information input validation at the Feature Service operation entry point prevents attackers from injecting and executing arbitrary SQL commands against the Enterprise Geodatabase.
Audit record generation for Feature Service operations and database queries enables detection of unauthorized SQL command execution attempts.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in public-facing ArcGIS Feature Service (T1190) enables arbitrary SQL execution on Enterprise Geodatabase for unauthorized data access (T1213.006).
NVD Description
A SQL Injection vulnerability exists in Esri ArcGIS Server versions 11.3, 11.4 and 11.5 on Windows, Linux and Kubernetes. This vulnerability allows a remote, unauthenticated attacker to execute arbitrary SQL commands via a specific ArcGIS Feature Service operation. Successful exploitation…
more
can potentially result in unauthorized access, modification, or deletion of data from the underlying Enterprise Geodatabase.
Deeper analysisAI
CVE-2025-57870 is a SQL injection vulnerability (CWE-89) affecting Esri ArcGIS Server versions 11.3, 11.4, and 11.5 running on Windows, Linux, and Kubernetes platforms. The flaw resides in a specific ArcGIS Feature Service operation, enabling the injection and execution of arbitrary SQL commands against the underlying Enterprise Geodatabase. Published on October 22, 2025, it carries a maximum CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H), reflecting its critical severity due to network accessibility, low attack complexity, and lack of prerequisites.
A remote, unauthenticated attacker can exploit this vulnerability over the network without user interaction. Successful exploitation allows execution of arbitrary SQL commands, potentially granting unauthorized access to sensitive data, modification of database contents, or deletion of records in the Enterprise Geodatabase.
Esri has addressed the issue through a security patch detailed in their advisory at https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-feature-services-security-patch, recommending immediate application to vulnerable ArcGIS Server Feature Services installations.
Details
- CWE(s)