CVE-2024-25705: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri Portal for ArcGIS
There is a cross‑site scripting (XSS) vulnerability in Esri Portal for ArcGIS Experience Builder versions 11.1 and below on Windows and Linux that allows a remote, authenticated attacker with low‑privileged access to create a crafted link which, when clicked, could potentially execute arbitrary JavaScript code in the victim’s browser. Exploitation requires basic authenticated access but does not require elevated or administrative privileges, indicating low privileges are required.
AI Analysis
Technical Summary
CVE-2024-25705 is a cross-site scripting (XSS) vulnerability classified under CWE-79 affecting Esri Portal for ArcGIS Experience Builder versions 11.1 and earlier on both Windows and Linux platforms. The vulnerability arises from improper neutralization of input during web page generation, allowing an attacker with low-privileged authenticated access to create a specially crafted link. When a victim clicks this link, arbitrary JavaScript code executes in their browser context. This can lead to theft of session tokens, unauthorized actions, or manipulation of the user interface. The attack requires the attacker to have basic authenticated access but does not require elevated or administrative privileges, lowering the barrier to exploitation within an organization. User interaction is necessary, as the victim must click the malicious link. The vulnerability affects all versions up to 11.1, with no patch links currently provided, and no known exploits reported in the wild. The CVSS v3.1 score is 5.4, indicating medium severity, with attack vector network, low attack complexity, low privileges required, user interaction required, and scope changed due to potential impact beyond the vulnerable component. The vulnerability primarily threatens confidentiality and integrity, with no direct impact on availability. Given the widespread use of Esri Portal for ArcGIS in geospatial data management, especially in government, utilities, and critical infrastructure sectors, this vulnerability poses a significant risk if exploited.
Potential Impact
For European organizations, the impact of CVE-2024-25705 can be significant, particularly for entities relying on Esri Portal for ArcGIS for critical geospatial data and operational workflows. Exploitation could lead to unauthorized access to sensitive spatial data, session hijacking, or manipulation of user actions within the portal, potentially disrupting decision-making processes or exposing confidential information. Sectors such as government agencies, urban planning, utilities, transportation, and emergency services that depend heavily on GIS platforms are at heightened risk. The requirement for low-privileged authenticated access means insider threats or compromised user credentials could facilitate exploitation. The need for user interaction (clicking a malicious link) suggests phishing or social engineering could be vectors for attack. While availability is not directly impacted, the compromise of confidentiality and integrity could undermine trust in GIS data and services, leading to operational delays or erroneous decisions. The absence of known exploits in the wild currently reduces immediate risk but does not preclude future exploitation, especially as threat actors often target widely used infrastructure software in Europe.
Mitigation Recommendations
1. Apply patches or updates from Esri as soon as they become available to address this vulnerability. 2. Until patches are released, restrict low-privileged user capabilities within the Portal for ArcGIS to minimize the ability to create or share potentially malicious links. 3. Implement strict input validation and output encoding on all user-generated content and URLs within the portal to prevent injection of malicious scripts. 4. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in users’ browsers. 5. Conduct user awareness training focused on phishing and social engineering to reduce the likelihood of users clicking malicious links. 6. Monitor portal logs for unusual link creation or access patterns that could indicate exploitation attempts. 7. Use multi-factor authentication (MFA) to reduce the risk of credential compromise leading to exploitation. 8. Segment the GIS environment to limit lateral movement if an account is compromised. 9. Regularly review and audit user privileges to ensure minimal necessary access is granted. 10. Collaborate with Esri support and security advisories to stay informed about updates and mitigation guidance.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2024-25705: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri Portal for ArcGIS
Description
There is a cross‑site scripting (XSS) vulnerability in Esri Portal for ArcGIS Experience Builder versions 11.1 and below on Windows and Linux that allows a remote, authenticated attacker with low‑privileged access to create a crafted link which, when clicked, could potentially execute arbitrary JavaScript code in the victim’s browser. Exploitation requires basic authenticated access but does not require elevated or administrative privileges, indicating low privileges are required.
AI-Powered Analysis
Technical Analysis
CVE-2024-25705 is a cross-site scripting (XSS) vulnerability classified under CWE-79 affecting Esri Portal for ArcGIS Experience Builder versions 11.1 and earlier on both Windows and Linux platforms. The vulnerability arises from improper neutralization of input during web page generation, allowing an attacker with low-privileged authenticated access to create a specially crafted link. When a victim clicks this link, arbitrary JavaScript code executes in their browser context. This can lead to theft of session tokens, unauthorized actions, or manipulation of the user interface. The attack requires the attacker to have basic authenticated access but does not require elevated or administrative privileges, lowering the barrier to exploitation within an organization. User interaction is necessary, as the victim must click the malicious link. The vulnerability affects all versions up to 11.1, with no patch links currently provided, and no known exploits reported in the wild. The CVSS v3.1 score is 5.4, indicating medium severity, with attack vector network, low attack complexity, low privileges required, user interaction required, and scope changed due to potential impact beyond the vulnerable component. The vulnerability primarily threatens confidentiality and integrity, with no direct impact on availability. Given the widespread use of Esri Portal for ArcGIS in geospatial data management, especially in government, utilities, and critical infrastructure sectors, this vulnerability poses a significant risk if exploited.
Potential Impact
For European organizations, the impact of CVE-2024-25705 can be significant, particularly for entities relying on Esri Portal for ArcGIS for critical geospatial data and operational workflows. Exploitation could lead to unauthorized access to sensitive spatial data, session hijacking, or manipulation of user actions within the portal, potentially disrupting decision-making processes or exposing confidential information. Sectors such as government agencies, urban planning, utilities, transportation, and emergency services that depend heavily on GIS platforms are at heightened risk. The requirement for low-privileged authenticated access means insider threats or compromised user credentials could facilitate exploitation. The need for user interaction (clicking a malicious link) suggests phishing or social engineering could be vectors for attack. While availability is not directly impacted, the compromise of confidentiality and integrity could undermine trust in GIS data and services, leading to operational delays or erroneous decisions. The absence of known exploits in the wild currently reduces immediate risk but does not preclude future exploitation, especially as threat actors often target widely used infrastructure software in Europe.
Mitigation Recommendations
1. Apply patches or updates from Esri as soon as they become available to address this vulnerability. 2. Until patches are released, restrict low-privileged user capabilities within the Portal for ArcGIS to minimize the ability to create or share potentially malicious links. 3. Implement strict input validation and output encoding on all user-generated content and URLs within the portal to prevent injection of malicious scripts. 4. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in users’ browsers. 5. Conduct user awareness training focused on phishing and social engineering to reduce the likelihood of users clicking malicious links. 6. Monitor portal logs for unusual link creation or access patterns that could indicate exploitation attempts. 7. Use multi-factor authentication (MFA) to reduce the risk of credential compromise leading to exploitation. 8. Segment the GIS environment to limit lateral movement if an account is compromised. 9. Regularly review and audit user privileges to ensure minimal necessary access is granted. 10. Collaborate with Esri support and security advisories to stay informed about updates and mitigation guidance.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Esri
- Date Reserved
- 2024-02-09T19:08:35.888Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9816c4522896dcbd6d54
Added to database: 5/21/2025, 9:08:38 AM
Last enriched: 2/6/2026, 8:10:36 AM
Last updated: 2/7/2026, 11:42:35 AM
Views: 43
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.