First published: Wed Feb 26 2025(Updated: )
There is a SQL injection issue in Esri ArcGIS Monitor versions 2023.0 through 2024.x on Windows and Linux that allows a remote, authenticated attacker with low privileges to improperly read limited database schema information by passing crafted queries. While it is possible to enumerate some internal database identifiers, the impact to the confidentiality vector is "LOW' because any sensitive data returned in a response is encrypted. There is no evidence of impact to the integrity or availability vectors. This issue is addressed in ArcGIS Monitor 2024.1.
Credit: psirt@esri.com
Affected Software | Affected Version | How to fix |
---|---|---|
Esri ArcGIS Monitor | >=2023.0<2024.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1726 has been classified as a medium severity vulnerability.
To mitigate CVE-2025-1726, upgrade Esri ArcGIS Monitor to version 2024.1 or later.
CVE-2025-1726 affects Esri ArcGIS Monitor versions 2023.0 through 2024.x on both Windows and Linux environments.
CVE-2025-1726 is a SQL injection vulnerability that allows unauthorized access to limited database schema information.
CVE-2025-1726 can be exploited by remote, authenticated attackers with low privileges.