Skip to main content

CVE-2025-57878: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in Esri Portal for ArcGIS

Medium
VulnerabilityCVE-2025-57878cvecve-2025-57878cwe-601
Published: Mon Sep 29 2025 (09/29/2025, 18:33:59 UTC)
Source: CVE Database V5
Vendor/Project: Esri
Product: Portal for ArcGIS

Description

There is an unvalidated redirect vulnerability in Esri Portal for ArcGIS 11.4 and below that may allow a remote, unauthenticated attacker to craft a URL that could redirect a victim to an arbitrary website, simplifying phishing attacks.

AI-Powered Analysis

AILast updated: 09/29/2025, 18:42:08 UTC

Technical Analysis

CVE-2025-57878 is an unvalidated redirect vulnerability classified under CWE-601 affecting Esri Portal for ArcGIS versions 11.4 and below, including version 10.9.1. This vulnerability allows a remote, unauthenticated attacker to craft a malicious URL that appears to originate from a legitimate Esri Portal for ArcGIS instance but redirects the victim to an arbitrary external website. The core issue is that the application fails to properly validate or sanitize redirect URLs, enabling open redirect attacks. Such attacks can be leveraged to facilitate phishing campaigns by exploiting user trust in the legitimate domain, potentially leading users to malicious sites designed to steal credentials, deliver malware, or conduct other social engineering exploits. The CVSS v3.1 base score is 6.1 (medium severity), reflecting that the attack vector is network-based with low attack complexity and no privileges required, but user interaction is necessary (clicking the crafted link). The vulnerability impacts confidentiality and integrity by enabling credential theft or session hijacking through phishing, but does not directly affect availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The scope is considered changed (S:C), indicating that the vulnerability affects components beyond the initially vulnerable component, potentially impacting user trust and security posture of the entire portal ecosystem.

Potential Impact

For European organizations using Esri Portal for ArcGIS, this vulnerability poses a significant risk primarily through social engineering and phishing attacks. Since the portal is often used by government agencies, urban planners, environmental organizations, and private sector companies for geographic information system (GIS) data sharing and collaboration, a successful open redirect attack could lead to credential compromise or unauthorized access to sensitive spatial data. This could result in data breaches, loss of intellectual property, or manipulation of critical infrastructure information. The indirect impact includes erosion of user trust in the platform, potential regulatory penalties under GDPR if personal data is compromised, and operational disruptions if attackers leverage stolen credentials for further attacks. The fact that the vulnerability requires no authentication but does require user interaction means that phishing campaigns could be crafted to exploit this weakness at scale, especially targeting employees or partners who frequently access the portal.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Immediately monitor for any suspicious URLs or phishing attempts that mimic their Esri Portal for ArcGIS domain. 2) Educate users about the risk of clicking on unexpected or suspicious links, emphasizing verification of URLs even if they appear to originate from trusted sources. 3) Implement web application firewall (WAF) rules to detect and block open redirect patterns or suspicious redirect parameters targeting the portal. 4) Restrict or validate redirect URLs on the server side by implementing a whitelist of allowed redirect destinations or by enforcing strict URL validation logic within the portal configuration or custom code. 5) Keep the Esri Portal for ArcGIS software up to date and apply any patches or updates released by Esri addressing this vulnerability as soon as they become available. 6) Employ multi-factor authentication (MFA) to reduce the impact of credential theft resulting from phishing. 7) Conduct regular phishing simulations and security awareness training tailored to the use of GIS platforms.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Esri
Date Reserved
2025-08-21T19:31:58.713Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68dad2d15387373ba0f2cb22

Added to database: 9/29/2025, 6:41:21 PM

Last enriched: 9/29/2025, 6:42:08 PM

Last updated: 10/2/2025, 12:30:00 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats