CVE-2025-57877

4.8 MEDIUM

📋 TL;DR

A reflected cross-site scripting (XSS) vulnerability in Esri Portal for ArcGIS allows remote authenticated administrators to inject malicious JavaScript that executes in victims' browsers. This affects Portal for ArcGIS versions 11.4 and below. Attackers could steal session cookies, redirect users, or perform actions on their behalf.

💻 Affected Systems

Products:
  • Esri Portal for ArcGIS
Versions: 11.4 and below
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated administrative access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator account compromise leading to full portal takeover, data theft, or malware distribution to other users.

🟠

Likely Case

Session hijacking of administrators or other users, credential theft, or unauthorized portal modifications.

🟢

If Mitigated

Limited impact due to required admin authentication and same-origin policy restrictions.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering or phishing to trick authenticated admins into clicking malicious links.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply Security 2025 Update 3 Patch

Vendor Advisory: https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2025-update-3-patch

Restart Required: No

Instructions:

1. Download the Security 2025 Update 3 patch from the Esri support site. 2. Apply the patch following Esri's portal patching procedures. 3. Verify the patch installation via the portal admin interface.

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement additional input sanitization for user-supplied strings in portal web interfaces.

Not applicable - requires code modifications

🧯 If You Can't Patch

  • Restrict administrative access to trusted networks only.
  • Implement web application firewall (WAF) rules to block XSS payloads.

🔍 How to Verify

Check if Vulnerable:

Check portal version in admin interface; if version is 11.4 or below, system is vulnerable.

Check Version:

Access Portal Admin > System > Properties to view version.

Verify Fix Applied:

Confirm portal version is updated post-patch and test XSS payloads are properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual long URL parameters containing script tags or JavaScript in web server logs
  • Multiple failed XSS attempts from single IP

Network Indicators:

  • HTTP requests with suspicious parameters like <script>, javascript:, or encoded payloads

SIEM Query:

source="portal_logs" AND ("<script>" OR "javascript:" OR "%3Cscript%3E")

🔗 References

📤 Share & Export