First published: Tue Aug 16 2022(Updated: )
A stored Cross Site Scripting (XSS) vulnerability in Esri Portal for ArcGIS may allow a remote, authenticated attacker to pass and store malicious strings via crafted queries which when accessed could potentially execute arbitrary JavaScript code in the user’s browser.
Credit: psirt@esri.com
Affected Software | Affected Version | How to fix |
---|---|---|
Esri Portal for ArcGIS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-38189.
The CVE-2022-38189 vulnerability has a severity rating of medium, with a CVSS score of 5.4.
The CVE-2022-38189 vulnerability affects Esri Portal for ArcGIS.
The CVE-2022-38189 vulnerability allows a remote, authenticated attacker to pass and store malicious strings via crafted queries, which can then execute arbitrary JavaScript code in the user's browser when accessed.
You can find more information about the CVE-2022-38189 vulnerability in the following link: [CVE-2022-38189](https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2022-update-1-patch/).