There is a stored Cross-site Scripting vulnerability in ArcGIS Server for versions 10.9.1 – 11.3 that may allow a remote, authenticated attacker to create a stored crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high, requiring publisher capabilities. The impact is low to both confidentiality and integrity while having no impact to availability.
References
Link | Resource |
---|---|
https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/ | Vendor Advisory |
Configurations
History
06 Mar 2025, 14:23
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:* | |
First Time |
Esri
Esri arcgis Server |
|
Summary |
|
|
References | () https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/ - Vendor Advisory |
03 Mar 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-03 20:15
Updated : 2025-03-06 14:23
NVD link : CVE-2024-51951
Mitre link : CVE-2024-51951
CVE.ORG link : CVE-2024-51951
JSON object : View
Products Affected
esri
- arcgis_server
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')