ArcGIS Security Blunder: Insecure OAuth 2.0 Revealed!
ArcGIS has a hidden talent—it’s an insecure OAuth 2.0 authentication trickster! This undocumented feature allows custom token expiration, turning secure design principles on their head. CVE-2025-0020 could make your security team break into a sweat faster than a hot yoga session. Secure your maps before they plot against you!

Hot Take:
ArcGIS has been caught with its pants down, showing off an insecure OAuth 2.0 based authentication that’s as hidden as a chameleon in a rainbow factory. This is the kind of secret you keep under lock and key, not the one you let loose through a mailing list! It’s like hiding your skeletons in the closet, only to invite the neighborhood over for a game of hide and seek.
Key Points:
- ArcGIS exposed an insecure OAuth 2.0 authentication flaw.
- The issue is linked to hidden and undocumented functionality.
- Vulnerability has a CVSS score of 7.9, which is high.
- The flaw allows manipulation and privilege abuse.
- It was discovered and reported by VULSec Labs.
Already a member? Log in here