CVE-2025-55106
📋 TL;DR
A stored cross-site scripting vulnerability in Esri Portal for ArcGIS Enterprise Sites allows authenticated attackers with high privileges to inject malicious files containing JavaScript. When victims load these files, arbitrary code executes in their browsers, potentially disclosing privileged tokens that could lead to full portal compromise. Affected versions range from 10.9.1 through 11.4.
💻 Affected Systems
- Esri Portal for ArcGIS Enterprise Sites
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attacker gains full administrative control of the Portal by stealing privileged tokens, leading to complete system compromise and data exfiltration.
Likely Case
Privileged user accounts are hijacked, allowing attackers to modify configurations, access sensitive data, and maintain persistence.
If Mitigated
With proper access controls and monitoring, impact is limited to isolated privilege escalation within authenticated sessions.
🎯 Exploit Status
Exploitation requires authenticated access with high privileges and ability to upload malicious files.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Esri advisory for specific patched versions
Vendor Advisory: https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/2925891-2
Restart Required: No
Instructions:
1. Review Esri advisory for patched versions. 2. Apply the appropriate security patch for your version. 3. Verify the patch is applied successfully.
🔧 Temporary Workarounds
Restrict File Uploads
allLimit file upload capabilities to trusted users and implement content validation for uploaded files.
🧯 If You Can't Patch
- Implement strict access controls to limit high-privilege accounts and monitor their activities.
- Deploy web application firewall rules to detect and block XSS payloads in file uploads.
🔍 How to Verify
Check if Vulnerable:
Check Portal version in ArcGIS Enterprise Manager or via administrative interface; compare against affected range 10.9.1-11.4.
Check Version:
Check via ArcGIS Enterprise administrative tools or consult system documentation for version query.
Verify Fix Applied:
Verify version is updated to a patched release as specified in Esri advisory and test file upload functionality for XSS.
📡 Detection & Monitoring
Log Indicators:
- Unusual file uploads by authenticated users, especially with script-like content or extensions.
- Suspicious authentication events followed by file manipulation activities.
Network Indicators:
- HTTP requests uploading files with embedded JavaScript or unusual MIME types.
- Outbound connections triggered by file loads that may indicate token exfiltration.
SIEM Query:
source="portal_logs" AND (event="file_upload" AND (file_name="*.js" OR content="<script>"))