fkie_cve-2025-57878
Vulnerability from fkie_nvd
Published
2025-09-29 19:15
Modified
2025-10-17 14:15
Summary
There is an unvalidated redirect vulnerability in Esri Portal for ArcGIS 11.4 and below that may allow a remote, unauthenticated attacker to craft a URL that could redirect a victim to an arbitrary website, simplifying phishing attacks.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:esri:portal_for_arcgis:10.9.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "43F37C65-CBEC-4688-8DB4-B58C83EEBC92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:esri:portal_for_arcgis:10.9.1:security_2025_update1:*:*:*:*:*:*",
              "matchCriteriaId": "A97FDB6F-0614-4F4A-91F1-09C230ED5E3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:esri:portal_for_arcgis:10.9.1:security_2025_update2:*:*:*:*:*:*",
              "matchCriteriaId": "7770A56F-0801-4982-828E-F43446224608",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:esri:portal_for_arcgis:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A62FCB5-12A6-487C-BCA9-0AD3F11354CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:esri:portal_for_arcgis:11.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "57DA68A3-0E09-4C8C-A98E-B027964FA17A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:esri:portal_for_arcgis:11.1:security_2024_update1:*:*:*:*:*:*",
              "matchCriteriaId": "C3A6B038-6C92-4A34-B980-E3872265FF89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:esri:portal_for_arcgis:11.1:security_2024_update2:*:*:*:*:*:*",
              "matchCriteriaId": "4DA6D70E-60D6-4CE6-AFA4-7BB191A23E3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:esri:portal_for_arcgis:11.1:security_2025_update1:*:*:*:*:*:*",
              "matchCriteriaId": "9FCD40AD-6D5B-498C-AFD7-B84B4FD1E3F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:esri:portal_for_arcgis:11.1:security_2025_update2:*:*:*:*:*:*",
              "matchCriteriaId": "3E2AE6CA-0F8E-4D40-94E3-FEAB2E7E2CF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:esri:portal_for_arcgis:11.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "3460737E-3181-4FCB-9A2B-D4C27C5FC774",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:esri:portal_for_arcgis:11.2:security_2024_update1:*:*:*:*:*:*",
              "matchCriteriaId": "E56FFF86-E366-4910-8ECB-9F93F903762F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:esri:portal_for_arcgis:11.2:security_2024_update2:*:*:*:*:*:*",
              "matchCriteriaId": "F299D739-C8EA-4BEC-A356-3ED7F49A9A3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:esri:portal_for_arcgis:11.2:security_2025_update1:*:*:*:*:*:*",
              "matchCriteriaId": "8B46D70A-E101-407D-B326-034232260364",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:esri:portal_for_arcgis:11.2:security_2025_update2:*:*:*:*:*:*",
              "matchCriteriaId": "021904ED-87FD-4FB4-BCC8-DE89DB05FB66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:esri:portal_for_arcgis:11.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "CF8719BA-95F6-4AB6-8A86-6742BE828260",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:esri:portal_for_arcgis:11.3:security_2025_update1:*:*:*:*:*:*",
              "matchCriteriaId": "7C19F9C7-F687-4865-8535-2E99E0AB0157",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:esri:portal_for_arcgis:11.3:security_2025_update2:*:*:*:*:*:*",
              "matchCriteriaId": "FC7EED3B-056E-4B86-94E4-FF0B62E376CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:esri:portal_for_arcgis:11.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "532CBBBF-BB12-483C-A996-A7DE7F0330A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:esri:portal_for_arcgis:11.4:security_2025_update1:*:*:*:*:*:*",
              "matchCriteriaId": "967840A2-98F6-4729-B979-32628AA34F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:esri:portal_for_arcgis:11.4:security_2025_update2:*:*:*:*:*:*",
              "matchCriteriaId": "278C5760-3183-4A79-BE1F-A280BD5A3274",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "There is an unvalidated redirect vulnerability in Esri Portal for ArcGIS 11.4 and below that may allow a remote, unauthenticated attacker to craft a URL that could redirect a victim to an arbitrary website, simplifying phishing attacks."
    }
  ],
  "id": "CVE-2025-57878",
  "lastModified": "2025-10-17T14:15:18.050",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "psirt@esri.com",
        "type": "Primary"
      }
    ]
  },
  "published": "2025-09-29T19:15:37.063",
  "references": [
    {
      "source": "psirt@esri.com",
      "tags": [
        "Vendor Advisory",
        "Patch"
      ],
      "url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2025-update-3-patch"
    }
  ],
  "sourceIdentifier": "psirt@esri.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-601"
        }
      ],
      "source": "psirt@esri.com",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…