First published: Fri Oct 04 2024(Updated: )
There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Experience Builder versions 10.8.1 – 11.1 that may allow a remote, authenticated attacker to create a crafted link that is stored in the Experience Builder Embed widget which when loaded could potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high. The attack could disclose a privileged token which may result in the attacker gaining full control of the Portal.
Credit: psirt@esri.com
Affected Software | Affected Version | How to fix |
---|---|---|
Esri Portal for ArcGIS | >=10.8.1<=11.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-25701 is classified as a high severity vulnerability due to the potential for stored Cross-site Scripting attacks.
To mitigate CVE-2024-25701, update to a patched version of Esri Portal for ArcGIS Enterprise Experience Builder that addresses this vulnerability.
CVE-2024-25701 affects users of Esri Portal for ArcGIS Enterprise Experience Builder versions 10.8.1 through 11.1.
CVE-2024-25701 is a stored Cross-site Scripting (XSS) vulnerability.
Attackers can exploit CVE-2024-25701 to execute arbitrary scripts in the context of a user's session when the crafted link is loaded.