CVE-2025-57877
📋 TL;DR
A reflected cross-site scripting (XSS) vulnerability in Esri Portal for ArcGIS allows remote authenticated administrators to inject malicious JavaScript that executes in victims' browsers. This affects Portal for ArcGIS versions 11.4 and below. Attackers could steal session cookies, redirect users, or perform actions on their behalf.
💻 Affected Systems
- Esri Portal for ArcGIS
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Administrator account compromise leading to full portal takeover, data theft, or malware distribution to other users.
Likely Case
Session hijacking of administrators or other users, credential theft, or unauthorized portal modifications.
If Mitigated
Limited impact due to required admin authentication and same-origin policy restrictions.
🎯 Exploit Status
Exploitation requires social engineering or phishing to trick authenticated admins into clicking malicious links.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Apply Security 2025 Update 3 Patch
Vendor Advisory: https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2025-update-3-patch
Restart Required: No
Instructions:
1. Download the Security 2025 Update 3 patch from the Esri support site. 2. Apply the patch following Esri's portal patching procedures. 3. Verify the patch installation via the portal admin interface.
🔧 Temporary Workarounds
Input Validation Enhancement
allImplement additional input sanitization for user-supplied strings in portal web interfaces.
Not applicable - requires code modifications
🧯 If You Can't Patch
- Restrict administrative access to trusted networks only.
- Implement web application firewall (WAF) rules to block XSS payloads.
🔍 How to Verify
Check if Vulnerable:
Check portal version in admin interface; if version is 11.4 or below, system is vulnerable.
Check Version:
Access Portal Admin > System > Properties to view version.
Verify Fix Applied:
Confirm portal version is updated post-patch and test XSS payloads are properly sanitized.
📡 Detection & Monitoring
Log Indicators:
- Unusual long URL parameters containing script tags or JavaScript in web server logs
- Multiple failed XSS attempts from single IP
Network Indicators:
- HTTP requests with suspicious parameters like <script>, javascript:, or encoded payloads
SIEM Query:
source="portal_logs" AND ("<script>" OR "javascript:" OR "%3Cscript%3E")