First published: Mon Mar 03 2025(Updated: )
There is a stored Cross-site Scripting vulnerability in ArcGIS Server for versions 10.9.1 – 11.3 that may allow a remote, authenticated attacker to create a stored crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high, requiring publisher capabilities. The impact is low to both confidentiality and integrity while having no impact to availability.
Credit: psirt@esri.com
Affected Software | Affected Version | How to fix |
---|---|---|
ESRI ArcGIS for Server | >=10.9.1<=11.3 | |
ESRI ArcGIS for Server | >=10.9.1<=11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5888 is a stored Cross-site Scripting vulnerability in ArcGIS Server versions 10.9.1 to 11.3 that allows authenticated attackers to execute arbitrary JavaScript in victims' browsers.
The vulnerability CVE-2024-5888 affects Esri ArcGIS Server versions 10.9.1 through 11.3.
The severity of CVE-2024-5888 is considered significant due to the potential for attackers to execute malicious scripts on victim browsers.
To fix CVE-2024-5888, update your Esri ArcGIS Server to the latest patched version that addresses this vulnerability.
Yes, CVE-2024-5888 can be exploited remotely by authenticated attackers who create a malicious link.