Skip to main content

CVE-2024-25709: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri Portal for ArcGIS

Medium
VulnerabilityCVE-2024-25709cvecve-2024-25709cwe-79
Published: Thu Apr 04 2024 (04/04/2024, 17:55:17 UTC)
Source: CVE
Vendor/Project: Esri
Product: Portal for ArcGIS

Description

There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS versions 11.2 and below that may allow a remote, authenticated attacker to create a crafted link that can be saved as a new location when moving an existing item which will potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high.

AI-Powered Analysis

AILast updated: 07/04/2025, 21:57:19 UTC

Technical Analysis

CVE-2024-25709 is a stored Cross-site Scripting (XSS) vulnerability identified in Esri Portal for ArcGIS versions 11.2 and below. This vulnerability arises from improper neutralization of input during web page generation (CWE-79), allowing an authenticated attacker with high privileges to craft a malicious link. This link can be saved as a new location when moving an existing item within the portal. When a victim subsequently accesses this crafted location, arbitrary JavaScript code embedded in the link executes in the victim's browser context. The vulnerability requires authentication and elevated privileges, which limits the attacker scope to users with significant access rights. The CVSS 3.1 base score is 6.1 (medium severity), reflecting the network attack vector, low attack complexity, no privileges required for exploitation (note: the description states high privileges required, so the CVSS vector may have some discrepancy), requirement for user interaction, and impact limited to confidentiality and integrity with no availability impact. Exploitation could lead to session hijacking, unauthorized actions on behalf of the victim, or data leakage within the portal environment. No known exploits are reported in the wild as of the publication date. The vulnerability affects all versions up to 11.2, indicating a broad impact on organizations using this GIS portal software. Esri Portal for ArcGIS is widely used for geographic information system (GIS) data management and sharing, often in government, utilities, and critical infrastructure sectors.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially to entities relying on Esri Portal for ArcGIS for spatial data collaboration and management. Successful exploitation could lead to unauthorized disclosure of sensitive geospatial data, manipulation of portal content, or execution of malicious scripts that compromise user sessions. This can undermine data integrity and confidentiality, potentially affecting decision-making processes in sectors such as urban planning, transportation, environmental monitoring, and emergency response. Given the high privileges required to exploit the vulnerability, insider threats or compromised privileged accounts are the most likely attack vectors. The cross-site scripting attack could also be leveraged to pivot to further attacks within the network if combined with other vulnerabilities or social engineering. The impact is heightened in regulated sectors subject to GDPR and other data protection laws, where data breaches can result in heavy fines and reputational damage.

Mitigation Recommendations

1. Immediate application of vendor patches or updates once available is critical. Since no patch links are provided yet, organizations should monitor Esri advisories closely. 2. Restrict and audit high-privilege accounts to minimize the risk of insider threats or account compromise. 3. Implement strict input validation and output encoding on all user-generated content within the portal environment to prevent injection of malicious scripts. 4. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers accessing the portal. 5. Conduct regular security awareness training for users with elevated privileges to recognize phishing and social engineering attempts that could lead to account compromise. 6. Monitor portal logs for unusual activities related to item movement or creation of new locations that could indicate exploitation attempts. 7. Consider network segmentation and access controls to limit exposure of the portal to only trusted users and networks. 8. Use multi-factor authentication (MFA) for all privileged accounts to reduce the risk of unauthorized access.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Esri
Date Reserved
2024-02-09T19:08:35.889Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9816c4522896dcbd6d6e

Added to database: 5/21/2025, 9:08:38 AM

Last enriched: 7/4/2025, 9:57:19 PM

Last updated: 7/27/2025, 1:32:17 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats