CVE-2025-55107

4.8 MEDIUM

📋 TL;DR

A stored cross-site scripting vulnerability in Esri Portal for ArcGIS Enterprise Sites allows authenticated attackers with high privileges to inject malicious files containing JavaScript. When victims load these files, arbitrary code executes in their browsers, potentially stealing privileged tokens. This affects versions 10.9.1 through 11.4 of the software.

💻 Affected Systems

Products:
  • Esri Portal for ArcGIS Enterprise Sites
Versions: 10.9.1 – 11.4
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated attacker with high privileges; vulnerability exists in file upload functionality with embedded scripts.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains full control of the Portal by stealing privileged tokens, leading to complete system compromise and data exfiltration.

🟠

Likely Case

Attacker steals session tokens or credentials from authenticated users, enabling unauthorized access to sensitive portal data and functions.

🟢

If Mitigated

With proper access controls and input validation, impact is limited to isolated user sessions without system-wide compromise.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access with elevated privileges and knowledge of file upload mechanisms.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.4 or later (check Esri advisory for specific patch versions)

Vendor Advisory: https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/2925891-2

Restart Required: No

Instructions:

1. Review Esri advisory for specific patch details. 2. Apply the latest security update for your version. 3. Verify patch installation through version check. 4. Test functionality after patching.

🔧 Temporary Workarounds

Restrict File Upload Permissions

all

Limit file upload capabilities to only trusted administrators and implement strict file type validation.

Implement Content Security Policy

all

Deploy CSP headers to restrict script execution from untrusted sources.

🧯 If You Can't Patch

  • Implement strict input validation and sanitization for all file uploads
  • Monitor and audit file upload activities from privileged users

🔍 How to Verify

Check if Vulnerable:

Check Portal version against affected range (10.9.1-11.4) and review file upload functionality for script execution.

Check Version:

Check Portal version through ArcGIS Enterprise Administrator Directory or web interface

Verify Fix Applied:

Verify Portal version is updated beyond 11.4 or has specific security patches applied per Esri advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads by privileged users
  • JavaScript execution in file contexts
  • Unexpected token or session activity

Network Indicators:

  • Suspicious file uploads to portal endpoints
  • Unexpected script loading from uploaded files

SIEM Query:

source="portal_logs" AND (event="file_upload" AND user_privilege="high")

🔗 References

📤 Share & Export