CVE-2025-57878

6.1 MEDIUM

📋 TL;DR

An unvalidated redirect vulnerability in Esri Portal for ArcGIS allows attackers to craft malicious URLs that redirect users to arbitrary websites. This can facilitate phishing attacks by making malicious links appear legitimate. Affected systems include Esri Portal for ArcGIS versions 11.4 and below.

💻 Affected Systems

Products:
  • Esri Portal for ArcGIS
Versions: 11.4 and below
Operating Systems: All supported OS for Portal for ArcGIS
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with vulnerable versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Users are redirected to sophisticated phishing sites that steal credentials or install malware, leading to account compromise and potential data breaches.

🟠

Likely Case

Attackers use crafted links in phishing campaigns to redirect users to fake login pages, harvesting credentials for further attacks.

🟢

If Mitigated

With proper user awareness training and URL filtering, users recognize suspicious redirects and avoid entering credentials on fake sites.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (clicking a malicious link). No authentication bypass is needed to craft the malicious URL.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply Security 2025 Update 3 Patch

Vendor Advisory: https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2025-update-3-patch

Restart Required: No

Instructions:

1. Download Security 2025 Update 3 Patch from My Esri. 2. Apply patch following Esri's patch deployment procedures. 3. Verify patch application through version check.

🔧 Temporary Workarounds

URL Validation Filter

all

Implement web application firewall or proxy rules to validate redirect URLs and block malicious patterns.

🧯 If You Can't Patch

  • Implement strict URL filtering at network perimeter to block known malicious domains.
  • Conduct user awareness training about phishing risks and suspicious redirects.

🔍 How to Verify

Check if Vulnerable:

Check Portal for ArcGIS version against affected range (11.4 and below).

Check Version:

Navigate to Portal Administrator Directory > System > Properties and check version.

Verify Fix Applied:

Verify version is updated post-patch and test redirect functionality with controlled test URLs.

📡 Detection & Monitoring

Log Indicators:

  • Unusual redirect patterns in web server logs
  • Multiple failed login attempts following redirects

Network Indicators:

  • HTTP 302 redirects to external domains from Portal URLs
  • Unusual outbound connections following redirects

SIEM Query:

source="portal_logs" AND (url="*redirect=*" OR status=302) AND dest_domain NOT IN allowed_domains

🔗 References

📤 Share & Export