First published: Thu Apr 04 2024(Updated: )
There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Web App Builder versions 10.8.1 – 10.9.1 that may allow a remote, authenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high.
Credit: psirt@esri.com
Affected Software | Affected Version | How to fix |
---|---|---|
Esri Portal for ArcGIS Enterprise Web AppBuilder | >=10.8.1<=10.9.1 | |
All of | ||
Any of | ||
=10.8.1 | ||
=10.9.1 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-25708 is considered a medium severity vulnerability due to its potential to allow remote attackers to execute arbitrary JavaScript code.
To fix CVE-2024-25708, update the Esri Portal for ArcGIS Enterprise Web App Builder to version 10.9.2 or later.
CVE-2024-25708 affects Esri Portal for ArcGIS Enterprise Web App Builder versions 10.8.1 to 10.9.1.
No, CVE-2024-25708 requires an authenticated user to exploit the stored Cross-site Scripting vulnerability.
CVE-2024-25708 is a stored Cross-site Scripting (XSS) vulnerability.