CVE-2024-8149: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri Portal for ArcGIS
CVE-2024-8149 is a medium severity reflected Cross-Site Scripting (XSS) vulnerability affecting Esri Portal for ArcGIS versions 11. 1 and 11. 2. It allows a remote, authenticated attacker with low privileges to craft a malicious link that executes arbitrary JavaScript in the victim's browser when clicked. The attack is limited to the same browser context and does not escalate privileges beyond the affected user session. Exploitation requires user interaction and authentication but can compromise confidentiality and integrity within the user session. No known exploits are currently in the wild. Organizations using affected versions should prioritize patching or apply mitigations to prevent exploitation. European organizations relying on Esri Portal for ArcGIS, especially those in critical infrastructure or government sectors, should be particularly vigilant. The vulnerability has a CVSS score of 4.
AI Analysis
Technical Summary
CVE-2024-8149 is a reflected Cross-Site Scripting (XSS) vulnerability identified in Esri Portal for ArcGIS versions 11.1 and 11.2. This vulnerability arises due to improper neutralization of input during web page generation (CWE-79), allowing an attacker to inject malicious JavaScript code into a crafted URL. The attacker must be authenticated with low privileges within the Portal environment and entice a victim to click the malicious link. Upon clicking, the injected script executes within the victim's browser under the same security context as the Portal session, potentially exposing sensitive session information or enabling actions on behalf of the user. However, the attack does not extend beyond the current user session or escalate privileges. The vulnerability requires user interaction and does not allow unauthenticated remote exploitation. The CVSS 3.1 base score is 4.6, indicating medium severity, with attack vector network, low attack complexity, privileges required, and user interaction necessary. No public exploits or patches have been reported at the time of publication, but the risk remains for organizations using the affected versions. The vulnerability is particularly relevant for environments where Portal for ArcGIS is used for critical geospatial data management and sharing, as exploitation could lead to session hijacking or data leakage within the user context.
Potential Impact
For European organizations, the impact of CVE-2024-8149 can be significant in sectors relying heavily on geospatial data and mapping services, such as government agencies, urban planning, utilities, and critical infrastructure operators. Exploitation could lead to unauthorized disclosure of sensitive information accessible within the user session, manipulation of user interface elements, or execution of actions with the victim's privileges. While the vulnerability does not allow privilege escalation or system-wide compromise, it can facilitate targeted attacks such as phishing, session hijacking, or lateral movement within the Portal environment. This risk is heightened in environments where multiple users have access to the Portal and where sensitive or regulated data is managed. The requirement for authentication and user interaction limits the attack surface but does not eliminate risk, especially in large organizations with many users. Additionally, the lack of available patches increases exposure time, necessitating interim mitigations. The impact on availability is minimal, but confidentiality and integrity within user sessions are at risk.
Mitigation Recommendations
To mitigate CVE-2024-8149, organizations should first verify if they are running Esri Portal for ArcGIS versions 11.1 or 11.2 and plan for immediate patching once updates are released by Esri. Until patches are available, implement strict input validation and output encoding on all user-supplied data within the Portal environment to prevent script injection. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing the Portal. Educate users about the risks of clicking unsolicited or suspicious links, especially those requiring authentication. Limit the number of users with access to the Portal and enforce the principle of least privilege to reduce the potential impact of compromised accounts. Monitor logs for unusual activity or repeated attempts to exploit XSS vectors. Consider deploying web application firewalls (WAFs) with rules tailored to detect and block reflected XSS payloads targeting the Portal. Finally, maintain an incident response plan that includes procedures for handling XSS exploitation scenarios.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden, Poland, Finland
CVE-2024-8149: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri Portal for ArcGIS
Description
CVE-2024-8149 is a medium severity reflected Cross-Site Scripting (XSS) vulnerability affecting Esri Portal for ArcGIS versions 11. 1 and 11. 2. It allows a remote, authenticated attacker with low privileges to craft a malicious link that executes arbitrary JavaScript in the victim's browser when clicked. The attack is limited to the same browser context and does not escalate privileges beyond the affected user session. Exploitation requires user interaction and authentication but can compromise confidentiality and integrity within the user session. No known exploits are currently in the wild. Organizations using affected versions should prioritize patching or apply mitigations to prevent exploitation. European organizations relying on Esri Portal for ArcGIS, especially those in critical infrastructure or government sectors, should be particularly vigilant. The vulnerability has a CVSS score of 4.
AI-Powered Analysis
Technical Analysis
CVE-2024-8149 is a reflected Cross-Site Scripting (XSS) vulnerability identified in Esri Portal for ArcGIS versions 11.1 and 11.2. This vulnerability arises due to improper neutralization of input during web page generation (CWE-79), allowing an attacker to inject malicious JavaScript code into a crafted URL. The attacker must be authenticated with low privileges within the Portal environment and entice a victim to click the malicious link. Upon clicking, the injected script executes within the victim's browser under the same security context as the Portal session, potentially exposing sensitive session information or enabling actions on behalf of the user. However, the attack does not extend beyond the current user session or escalate privileges. The vulnerability requires user interaction and does not allow unauthenticated remote exploitation. The CVSS 3.1 base score is 4.6, indicating medium severity, with attack vector network, low attack complexity, privileges required, and user interaction necessary. No public exploits or patches have been reported at the time of publication, but the risk remains for organizations using the affected versions. The vulnerability is particularly relevant for environments where Portal for ArcGIS is used for critical geospatial data management and sharing, as exploitation could lead to session hijacking or data leakage within the user context.
Potential Impact
For European organizations, the impact of CVE-2024-8149 can be significant in sectors relying heavily on geospatial data and mapping services, such as government agencies, urban planning, utilities, and critical infrastructure operators. Exploitation could lead to unauthorized disclosure of sensitive information accessible within the user session, manipulation of user interface elements, or execution of actions with the victim's privileges. While the vulnerability does not allow privilege escalation or system-wide compromise, it can facilitate targeted attacks such as phishing, session hijacking, or lateral movement within the Portal environment. This risk is heightened in environments where multiple users have access to the Portal and where sensitive or regulated data is managed. The requirement for authentication and user interaction limits the attack surface but does not eliminate risk, especially in large organizations with many users. Additionally, the lack of available patches increases exposure time, necessitating interim mitigations. The impact on availability is minimal, but confidentiality and integrity within user sessions are at risk.
Mitigation Recommendations
To mitigate CVE-2024-8149, organizations should first verify if they are running Esri Portal for ArcGIS versions 11.1 or 11.2 and plan for immediate patching once updates are released by Esri. Until patches are available, implement strict input validation and output encoding on all user-supplied data within the Portal environment to prevent script injection. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing the Portal. Educate users about the risks of clicking unsolicited or suspicious links, especially those requiring authentication. Limit the number of users with access to the Portal and enforce the principle of least privilege to reduce the potential impact of compromised accounts. Monitor logs for unusual activity or repeated attempts to exploit XSS vectors. Consider deploying web application firewalls (WAFs) with rules tailored to detect and block reflected XSS payloads targeting the Portal. Finally, maintain an incident response plan that includes procedures for handling XSS exploitation scenarios.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Esri
- Date Reserved
- 2024-08-25T00:40:21.522Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69858a71f9fa50a62fe1264c
Added to database: 2/6/2026, 6:30:09 AM
Last enriched: 2/6/2026, 6:45:07 AM
Last updated: 2/6/2026, 7:38:57 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2008: Code Injection in abhiphile fermat-mcp
MediumCVE-2026-2000: Command Injection in DCN DCME-320
MediumCVE-2026-1909: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in x-raym WaveSurfer-WP
MediumCVE-2026-1888: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in htplugins Docus – YouTube Video Playlist
MediumCVE-2026-1808: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ravanh Orange Comfort+ accessibility toolbar for WordPress
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.