The pentest professionals at usd HeroLab examined Kofax Communication Server (KCS) and ArcGIS scripting language Arcade as part of web application pentests and identified several vulnerabilities.
Two of the vulnerabilities result from insufficient validation of file-related parameters in the KCS Portal and enable path traversal attacks, which allow arbitrary files to be read from the server as well as the upload and execution of manipulated files. Another vulnerability affects ArcGIS Arcade scripts, which, despite existing restriction mechanisms, allow arbitrary JavaScript to be executed in JavaScript runtime environments.
The vulnerabilities were reported to the vendors as part of the Responsible Disclosure Policy. Detailed information about the advisories can be found here:
| ID | Product | Vulnerability Type |
|---|---|---|
| usd-2025-0067 | Kofax Communication Server | Unrestricted Upload of File with Dangerous Type (CWE-434) |
| usd-2025-0066 | Kofax Communication Server | Path Traversal (CWE-22) |
| usd-2025-0013 | ArcGIS Arcade | Sandbox Escape |
About usd HeroLab Security Advisories
In order to protect businesses against hackers and criminals, we must ensure that our skills and knowledge are up to date at all times. Therefore, security research is just as important to our work as is building up a security community to promote an exchange of knowledge. After all, more security can only be achieved if many people take on the task.
We analyze attack scenarios, which are changing constantly, and publish a series of Security Advisories on current vulnerabilities and security issues – always in line with our Responsible Disclosure Policy.
Always in the name of our mission: “more security.”



