Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-23025 | There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS versions 11.2 and below that may allow a remote, authenticated attacker to create a crafted link that can be saved as a new location when moving an existing item which will potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high. |
Fri, 06 Feb 2026 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS versions 11.2 and below that may allow a remote, authenticated attacker to create a crafted link that can be saved as a new location when moving an existing item which will potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high. | There is a stored Cross‑Site Scripting (XSS) vulnerability in Esri Portal for ArcGIS versions 11.2 and below that may allow a remote, authenticated attacker to create a crafted link that can be saved as a new location when moving an existing item, which could potentially execute arbitrary JavaScript code in a victim’s browser. Exploitation does not require any privileges and can be performed by an anonymous user. |
Thu, 10 Apr 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS versions 10.8.1 – 1121 that may allow a remote, authenticated attacker to create a crafted link that can be saved as a new location when moving an existing item which will potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high. | There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS versions 11.2 and below that may allow a remote, authenticated attacker to create a crafted link that can be saved as a new location when moving an existing item which will potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high. |
Thu, 23 Jan 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Esri
Esri portal For Arcgis Linux Linux linux Kernel Microsoft Microsoft windows |
|
| CPEs | cpe:2.3:a:esri:portal_for_arcgis:10.8.1:*:*:*:*:*:*:* cpe:2.3:a:esri:portal_for_arcgis:10.9.1:*:*:*:*:*:*:* cpe:2.3:a:esri:portal_for_arcgis:11.0:*:*:*:*:*:*:* cpe:2.3:a:esri:portal_for_arcgis:11.1:*:*:*:*:*:*:* cpe:2.3:a:esri:portal_for_arcgis:11.2:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Esri
Esri portal For Arcgis Linux Linux linux Kernel Microsoft Microsoft windows |
Tue, 08 Oct 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 08 Oct 2024 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because this item is scheduled to be patched at a future time. | There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS versions 10.8.1 – 1121 that may allow a remote, authenticated attacker to create a crafted link that can be saved as a new location when moving an existing item which will potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high. |
| Title | Self-XSS style in move item dialog | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Esri
Published:
Updated: 2026-02-06T06:10:48.587Z
Reserved: 2024-02-09T19:08:35.889Z
Link: CVE-2024-25709
Updated: 2024-07-05T15:20:43.092Z
Status : Analyzed
Published: 2024-04-04T18:15:13.340
Modified: 2026-02-13T19:41:45.883
Link: CVE-2024-25709
No data.
OpenCVE Enrichment
No data.
EUVD