Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-8149: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri Portal for ArcGIS

0
Medium
VulnerabilityCVE-2024-8149cvecve-2024-8149cwe-79
Published: Fri Oct 04 2024 (10/04/2024, 17:14:39 UTC)
Source: CVE Database V5
Vendor/Project: Esri
Product: Portal for ArcGIS

Description

CVE-2024-8149 is a medium severity reflected Cross-Site Scripting (XSS) vulnerability affecting Esri Portal for ArcGIS versions 11. 1 and 11. 2. It allows a remote, authenticated attacker with low privileges to craft a malicious link that executes arbitrary JavaScript in the victim's browser when clicked. The attack is limited to the same browser context and does not escalate privileges beyond the affected user session. Exploitation requires user interaction and authentication but can compromise confidentiality and integrity within the user session. No known exploits are currently in the wild. Organizations using affected versions should prioritize patching or apply mitigations to prevent exploitation. European organizations relying on Esri Portal for ArcGIS, especially those in critical infrastructure or government sectors, should be particularly vigilant. The vulnerability has a CVSS score of 4.

AI-Powered Analysis

AILast updated: 02/06/2026, 06:45:07 UTC

Technical Analysis

CVE-2024-8149 is a reflected Cross-Site Scripting (XSS) vulnerability identified in Esri Portal for ArcGIS versions 11.1 and 11.2. This vulnerability arises due to improper neutralization of input during web page generation (CWE-79), allowing an attacker to inject malicious JavaScript code into a crafted URL. The attacker must be authenticated with low privileges within the Portal environment and entice a victim to click the malicious link. Upon clicking, the injected script executes within the victim's browser under the same security context as the Portal session, potentially exposing sensitive session information or enabling actions on behalf of the user. However, the attack does not extend beyond the current user session or escalate privileges. The vulnerability requires user interaction and does not allow unauthenticated remote exploitation. The CVSS 3.1 base score is 4.6, indicating medium severity, with attack vector network, low attack complexity, privileges required, and user interaction necessary. No public exploits or patches have been reported at the time of publication, but the risk remains for organizations using the affected versions. The vulnerability is particularly relevant for environments where Portal for ArcGIS is used for critical geospatial data management and sharing, as exploitation could lead to session hijacking or data leakage within the user context.

Potential Impact

For European organizations, the impact of CVE-2024-8149 can be significant in sectors relying heavily on geospatial data and mapping services, such as government agencies, urban planning, utilities, and critical infrastructure operators. Exploitation could lead to unauthorized disclosure of sensitive information accessible within the user session, manipulation of user interface elements, or execution of actions with the victim's privileges. While the vulnerability does not allow privilege escalation or system-wide compromise, it can facilitate targeted attacks such as phishing, session hijacking, or lateral movement within the Portal environment. This risk is heightened in environments where multiple users have access to the Portal and where sensitive or regulated data is managed. The requirement for authentication and user interaction limits the attack surface but does not eliminate risk, especially in large organizations with many users. Additionally, the lack of available patches increases exposure time, necessitating interim mitigations. The impact on availability is minimal, but confidentiality and integrity within user sessions are at risk.

Mitigation Recommendations

To mitigate CVE-2024-8149, organizations should first verify if they are running Esri Portal for ArcGIS versions 11.1 or 11.2 and plan for immediate patching once updates are released by Esri. Until patches are available, implement strict input validation and output encoding on all user-supplied data within the Portal environment to prevent script injection. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing the Portal. Educate users about the risks of clicking unsolicited or suspicious links, especially those requiring authentication. Limit the number of users with access to the Portal and enforce the principle of least privilege to reduce the potential impact of compromised accounts. Monitor logs for unusual activity or repeated attempts to exploit XSS vectors. Consider deploying web application firewalls (WAFs) with rules tailored to detect and block reflected XSS payloads targeting the Portal. Finally, maintain an incident response plan that includes procedures for handling XSS exploitation scenarios.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Esri
Date Reserved
2024-08-25T00:40:21.522Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69858a71f9fa50a62fe1264c

Added to database: 2/6/2026, 6:30:09 AM

Last enriched: 2/6/2026, 6:45:07 AM

Last updated: 2/6/2026, 7:38:57 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats