CVE-2025-57872

6.1 MEDIUM

📋 TL;DR

This CVE describes an unvalidated redirect vulnerability in Esri Portal for ArcGIS that allows attackers to craft malicious URLs. When clicked, these URLs can redirect victims to arbitrary external websites, facilitating phishing attacks. The vulnerability affects all unpatched versions up to and including 11.4.

💻 Affected Systems

Products:
  • Esri Portal for ArcGIS
Versions: All versions up to and including 11.4
Operating Systems: All supported OS for Portal for ArcGIS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default installations; no special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Successful phishing campaigns leading to credential theft, malware installation, or data exfiltration from users who trust legitimate Esri Portal URLs.

🟠

Likely Case

Phishing attacks targeting users who click on crafted links, potentially compromising individual accounts or systems.

🟢

If Mitigated

Limited impact with user awareness training and proper URL validation in place, though the vulnerability still exists.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (clicking a link) but is technically simple for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply Security 2025 Update 3 Patch

Vendor Advisory: https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2025-update-3-patch

Restart Required: No

Instructions:

1. Download the Security 2025 Update 3 patch from the Esri support site. 2. Apply the patch following Esri's patch deployment procedures. 3. Verify the patch was applied successfully.

🔧 Temporary Workarounds

URL Validation Implementation

all

Implement server-side validation to ensure redirect URLs are within the same domain or approved list.

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block suspicious redirect patterns.
  • Educate users about phishing risks and safe clicking practices.

🔍 How to Verify

Check if Vulnerable:

Check if Portal for ArcGIS version is 11.4 or earlier and not patched with Security 2025 Update 3.

Check Version:

Check the Portal for ArcGIS version in the administrative interface or configuration files.

Verify Fix Applied:

Verify that the Security 2025 Update 3 patch is applied and test redirect functionality with controlled URLs.

📡 Detection & Monitoring

Log Indicators:

  • Unusual redirect patterns in web server logs
  • Requests with external URLs in redirect parameters

Network Indicators:

  • HTTP 302 redirects to unexpected external domains
  • Suspicious referrer headers

SIEM Query:

source="portal_logs" AND (url="*redirect=*" OR status=302) AND url!="*esri.com*"

🔗 References

📤 Share & Export