Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Upgrade to ArcGIS Pro 3.6.1
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 06 Feb 2026 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | There is a Cross Site Scripting issue in Esri ArcGIS Pro versions 3.6.0 and earlier. A local attacker could supply malicious strings into ArcGIS Pro which may execute when a specific dialog is opened. This issue is fixed in ArcGIS Pro 3.6.1. | There is a Cross‑Site Scripting (XSS) issue in Esri ArcGIS Pro versions 3.6.0 and earlier. ArcGIS Pro is a desktop application, and exploitation is limited to local users interacting with the application; no privileged role or elevated permissions are required beyond standard local user access. A local attacker can supply malicious strings that may be rendered and executed when a specific dialog within ArcGIS Pro is opened. This issue is fixed in ArcGIS Pro version 3.6.1. |
| Title | XSS issue is Esri ArcGIS Pro versions 3.6.0 and earlier |
Mon, 02 Feb 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:esri:arcgis_pro:*:*:*:*:*:*:*:* |
Tue, 27 Jan 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Esri
Esri arcgis Pro |
|
| Vendors & Products |
Esri
Esri arcgis Pro |
Mon, 26 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 26 Jan 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | There is a Cross Site Scripting issue in Esri ArcGIS Pro versions 3.6.0 and earlier. A local attacker could supply malicious strings into ArcGIS Pro which may execute when a specific dialog is opened. This issue is fixed in ArcGIS Pro 3.6.1. | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Esri
Published:
Updated: 2026-02-06T06:04:15.645Z
Reserved: 2026-01-26T16:40:43.410Z
Link: CVE-2026-1446
Updated: 2026-01-26T21:03:38.028Z
Status : Analyzed
Published: 2026-01-26T18:16:30.140
Modified: 2026-02-13T19:41:55.783
Link: CVE-2026-1446
No data.
OpenCVE Enrichment
Updated: 2026-04-18T15:15:03Z