There is a cross‑site scripting (XSS) vulnerability in Esri Portal for ArcGIS Experience Builder versions 11.1 and below on Windows and Linux that allows a remote, authenticated attacker with low‑privileged access to create a crafted link which, when clicked, could potentially execute arbitrary JavaScript code in the victim’s browser. Exploitation requires basic authenticated access but does not require elevated or administrative privileges, indicating low privileges are required.
References
Configurations
Configuration 1 (hide)
| AND |
|
History
13 Feb 2026, 19:41
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/the-portal-for-arcgis-security-2024-update-2-is-available-install-these-patches-at-your-earliest-opportunity-to-address-these-vulnerabilities/ - Vendor Advisory |
06 Feb 2026, 07:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) There is a cross‑site scripting (XSS) vulnerability in Esri Portal for ArcGIS Experience Builder versions 11.1 and below on Windows and Linux that allows a remote, authenticated attacker with low‑privileged access to create a crafted link which, when clicked, could potentially execute arbitrary JavaScript code in the victim’s browser. Exploitation requires basic authenticated access but does not require elevated or administrative privileges, indicating low privileges are required. |
06 Feb 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
30 Jan 2025, 16:21
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-2/ - Broken Link, Not Applicable | |
| CPE | cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:a:esri:portal_for_arcgis:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* |
|
| First Time |
Linux
Microsoft windows Esri portal For Arcgis Esri Linux linux Kernel Microsoft |
10 Oct 2024, 12:57
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
08 Oct 2024, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
| References |
|
|
| Summary | (en) There is a cross site scripting vulnerability in the Esri Portal for ArcGIS Experience Builder 11.1 and below on Windows and Linux that allows a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are low. | |
| CWE | CWE-79 |
25 Apr 2024, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary |
|
|
| Summary | (en) Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because this item is scheduled to be patched at a future time. | |
| CWE | ||
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
04 Apr 2024, 19:24
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-04-04 18:15
Updated : 2026-02-13 19:41
NVD link : CVE-2024-25705
Mitre link : CVE-2024-25705
CVE.ORG link : CVE-2024-25705
JSON object : View
Products Affected
microsoft
- windows
linux
- linux_kernel
esri
- portal_for_arcgis
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
