Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25705: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri Portal for ArcGIS

0
Medium
VulnerabilityCVE-2024-25705cvecve-2024-25705cwe-79
Published: Thu Apr 04 2024 (04/04/2024, 17:55:55 UTC)
Source: CVE
Vendor/Project: Esri
Product: Portal for ArcGIS

Description

There is a cross‑site scripting (XSS) vulnerability in Esri Portal for ArcGIS Experience Builder versions 11.1 and below on Windows and Linux that allows a remote, authenticated attacker with low‑privileged access to create a crafted link which, when clicked, could potentially execute arbitrary JavaScript code in the victim’s browser. Exploitation requires basic authenticated access but does not require elevated or administrative privileges, indicating low privileges are required.

AI-Powered Analysis

AILast updated: 02/06/2026, 08:10:36 UTC

Technical Analysis

CVE-2024-25705 is a cross-site scripting (XSS) vulnerability classified under CWE-79 affecting Esri Portal for ArcGIS Experience Builder versions 11.1 and earlier on both Windows and Linux platforms. The vulnerability arises from improper neutralization of input during web page generation, allowing an attacker with low-privileged authenticated access to create a specially crafted link. When a victim clicks this link, arbitrary JavaScript code executes in their browser context. This can lead to theft of session tokens, unauthorized actions, or manipulation of the user interface. The attack requires the attacker to have basic authenticated access but does not require elevated or administrative privileges, lowering the barrier to exploitation within an organization. User interaction is necessary, as the victim must click the malicious link. The vulnerability affects all versions up to 11.1, with no patch links currently provided, and no known exploits reported in the wild. The CVSS v3.1 score is 5.4, indicating medium severity, with attack vector network, low attack complexity, low privileges required, user interaction required, and scope changed due to potential impact beyond the vulnerable component. The vulnerability primarily threatens confidentiality and integrity, with no direct impact on availability. Given the widespread use of Esri Portal for ArcGIS in geospatial data management, especially in government, utilities, and critical infrastructure sectors, this vulnerability poses a significant risk if exploited.

Potential Impact

For European organizations, the impact of CVE-2024-25705 can be significant, particularly for entities relying on Esri Portal for ArcGIS for critical geospatial data and operational workflows. Exploitation could lead to unauthorized access to sensitive spatial data, session hijacking, or manipulation of user actions within the portal, potentially disrupting decision-making processes or exposing confidential information. Sectors such as government agencies, urban planning, utilities, transportation, and emergency services that depend heavily on GIS platforms are at heightened risk. The requirement for low-privileged authenticated access means insider threats or compromised user credentials could facilitate exploitation. The need for user interaction (clicking a malicious link) suggests phishing or social engineering could be vectors for attack. While availability is not directly impacted, the compromise of confidentiality and integrity could undermine trust in GIS data and services, leading to operational delays or erroneous decisions. The absence of known exploits in the wild currently reduces immediate risk but does not preclude future exploitation, especially as threat actors often target widely used infrastructure software in Europe.

Mitigation Recommendations

1. Apply patches or updates from Esri as soon as they become available to address this vulnerability. 2. Until patches are released, restrict low-privileged user capabilities within the Portal for ArcGIS to minimize the ability to create or share potentially malicious links. 3. Implement strict input validation and output encoding on all user-generated content and URLs within the portal to prevent injection of malicious scripts. 4. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in users’ browsers. 5. Conduct user awareness training focused on phishing and social engineering to reduce the likelihood of users clicking malicious links. 6. Monitor portal logs for unusual link creation or access patterns that could indicate exploitation attempts. 7. Use multi-factor authentication (MFA) to reduce the risk of credential compromise leading to exploitation. 8. Segment the GIS environment to limit lateral movement if an account is compromised. 9. Regularly review and audit user privileges to ensure minimal necessary access is granted. 10. Collaborate with Esri support and security advisories to stay informed about updates and mitigation guidance.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Esri
Date Reserved
2024-02-09T19:08:35.888Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9816c4522896dcbd6d54

Added to database: 5/21/2025, 9:08:38 AM

Last enriched: 2/6/2026, 8:10:36 AM

Last updated: 2/7/2026, 1:13:10 PM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats