CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-1067: There is a code injection vulnerability in ArcGIS Pro

7.3 CVSS

Description

There is an untrusted search path vulnerability in Esri ArcGIS Pro 3.3 and 3.4 that may allow a low privileged attacker with write privileges to the local file system to introduce a malicious executable to the filesystem. When the victim performs a specific action using ArcGIS

ArcGIS Pro

, the file could execute and run malicious commands under the context of the victim.

Classification

CVE ID: CVE-2025-1067

CVSS Base Severity: HIGH

CVSS Base Score: 7.3

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

Problem Types

CWE-732 Incorrect Permission Assignment for Critical Resource

Affected Products

Vendor: Esri

Product: ArcGIS Pro

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.01% (probability of being exploited)

EPSS Percentile: 0.81% (scored less or equal to compared to others)

EPSS Date: 2025-03-26 (when was this score calculated)

Stakeholder-Specific Vulnerability Categorization (SSVC)

SSVC Exploitation: none

SSVC Technical Impact: total

SSVC Automatable: false

References

https://nvd.nist.gov/vuln/detail/CVE-2025-1067
https://www.esri.com/arcgis-blog/products/administration/administration/arcgis-pro-and-arcgis-allsource-patches-address-high-severity-vulnerabilities

Timeline