CVE-2024-8149: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri Portal for ArcGIS
There is a reflected Cross‑Site Scripting (XSS) vulnerability in Esri Portal for ArcGIS versions 11.1 and 11.2 that may allow a remote, authenticated attacker with low‑privileged access to create a crafted link which, when clicked, could potentially execute arbitrary JavaScript code in the victim’s browser. Exploitation is limited to the same browser execution context and does not result in a change of security scope beyond the affected user session.
AI Analysis
Technical Summary
CVE-2024-8149 is a reflected Cross-Site Scripting (XSS) vulnerability identified in Esri Portal for ArcGIS versions 11.1 and 11.2. This vulnerability arises due to improper neutralization of input during web page generation (CWE-79), allowing an attacker to inject malicious JavaScript code into a crafted URL. The attacker must be authenticated with low privileges within the Portal environment and entice a victim to click the malicious link. Upon clicking, the injected script executes within the victim's browser under the same security context as the Portal session, potentially exposing sensitive session information or enabling actions on behalf of the user. However, the attack does not extend beyond the current user session or escalate privileges. The vulnerability requires user interaction and does not allow unauthenticated remote exploitation. The CVSS 3.1 base score is 4.6, indicating medium severity, with attack vector network, low attack complexity, privileges required, and user interaction necessary. No public exploits or patches have been reported at the time of publication, but the risk remains for organizations using the affected versions. The vulnerability is particularly relevant for environments where Portal for ArcGIS is used for critical geospatial data management and sharing, as exploitation could lead to session hijacking or data leakage within the user context.
Potential Impact
For European organizations, the impact of CVE-2024-8149 can be significant in sectors relying heavily on geospatial data and mapping services, such as government agencies, urban planning, utilities, and critical infrastructure operators. Exploitation could lead to unauthorized disclosure of sensitive information accessible within the user session, manipulation of user interface elements, or execution of actions with the victim's privileges. While the vulnerability does not allow privilege escalation or system-wide compromise, it can facilitate targeted attacks such as phishing, session hijacking, or lateral movement within the Portal environment. This risk is heightened in environments where multiple users have access to the Portal and where sensitive or regulated data is managed. The requirement for authentication and user interaction limits the attack surface but does not eliminate risk, especially in large organizations with many users. Additionally, the lack of available patches increases exposure time, necessitating interim mitigations. The impact on availability is minimal, but confidentiality and integrity within user sessions are at risk.
Mitigation Recommendations
To mitigate CVE-2024-8149, organizations should first verify if they are running Esri Portal for ArcGIS versions 11.1 or 11.2 and plan for immediate patching once updates are released by Esri. Until patches are available, implement strict input validation and output encoding on all user-supplied data within the Portal environment to prevent script injection. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing the Portal. Educate users about the risks of clicking unsolicited or suspicious links, especially those requiring authentication. Limit the number of users with access to the Portal and enforce the principle of least privilege to reduce the potential impact of compromised accounts. Monitor logs for unusual activity or repeated attempts to exploit XSS vectors. Consider deploying web application firewalls (WAFs) with rules tailored to detect and block reflected XSS payloads targeting the Portal. Finally, maintain an incident response plan that includes procedures for handling XSS exploitation scenarios.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden, Poland, Finland
CVE-2024-8149: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri Portal for ArcGIS
Description
There is a reflected Cross‑Site Scripting (XSS) vulnerability in Esri Portal for ArcGIS versions 11.1 and 11.2 that may allow a remote, authenticated attacker with low‑privileged access to create a crafted link which, when clicked, could potentially execute arbitrary JavaScript code in the victim’s browser. Exploitation is limited to the same browser execution context and does not result in a change of security scope beyond the affected user session.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-8149 is a reflected Cross-Site Scripting (XSS) vulnerability identified in Esri Portal for ArcGIS versions 11.1 and 11.2. This vulnerability arises due to improper neutralization of input during web page generation (CWE-79), allowing an attacker to inject malicious JavaScript code into a crafted URL. The attacker must be authenticated with low privileges within the Portal environment and entice a victim to click the malicious link. Upon clicking, the injected script executes within the victim's browser under the same security context as the Portal session, potentially exposing sensitive session information or enabling actions on behalf of the user. However, the attack does not extend beyond the current user session or escalate privileges. The vulnerability requires user interaction and does not allow unauthenticated remote exploitation. The CVSS 3.1 base score is 4.6, indicating medium severity, with attack vector network, low attack complexity, privileges required, and user interaction necessary. No public exploits or patches have been reported at the time of publication, but the risk remains for organizations using the affected versions. The vulnerability is particularly relevant for environments where Portal for ArcGIS is used for critical geospatial data management and sharing, as exploitation could lead to session hijacking or data leakage within the user context.
Potential Impact
For European organizations, the impact of CVE-2024-8149 can be significant in sectors relying heavily on geospatial data and mapping services, such as government agencies, urban planning, utilities, and critical infrastructure operators. Exploitation could lead to unauthorized disclosure of sensitive information accessible within the user session, manipulation of user interface elements, or execution of actions with the victim's privileges. While the vulnerability does not allow privilege escalation or system-wide compromise, it can facilitate targeted attacks such as phishing, session hijacking, or lateral movement within the Portal environment. This risk is heightened in environments where multiple users have access to the Portal and where sensitive or regulated data is managed. The requirement for authentication and user interaction limits the attack surface but does not eliminate risk, especially in large organizations with many users. Additionally, the lack of available patches increases exposure time, necessitating interim mitigations. The impact on availability is minimal, but confidentiality and integrity within user sessions are at risk.
Mitigation Recommendations
To mitigate CVE-2024-8149, organizations should first verify if they are running Esri Portal for ArcGIS versions 11.1 or 11.2 and plan for immediate patching once updates are released by Esri. Until patches are available, implement strict input validation and output encoding on all user-supplied data within the Portal environment to prevent script injection. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing the Portal. Educate users about the risks of clicking unsolicited or suspicious links, especially those requiring authentication. Limit the number of users with access to the Portal and enforce the principle of least privilege to reduce the potential impact of compromised accounts. Monitor logs for unusual activity or repeated attempts to exploit XSS vectors. Consider deploying web application firewalls (WAFs) with rules tailored to detect and block reflected XSS payloads targeting the Portal. Finally, maintain an incident response plan that includes procedures for handling XSS exploitation scenarios.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Esri
- Date Reserved
- 2024-08-25T00:40:21.522Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69858a71f9fa50a62fe1264c
Added to database: 2/6/2026, 6:30:09 AM
Last enriched: 2/6/2026, 6:45:07 AM
Last updated: 3/22/2026, 1:06:11 PM
Views: 50
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.