CVE-2023-25837
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker with high-level access to create a malicious link that, when clicked by a victim, can run harmful JavaScript in their browser. This could let the attacker steal sensitive information, alter trusted content, or disrupt the application's normal operations.
Technical Description
There is a Cross‑Site Scripting (XSS) vulnerability in Esri ArcGIS Enterprise Sites versions 10.9 and below that may allow a remote, authenticated attacker to create a crafted link which, when clicked by a victim, could result in the execution of arbitrary JavaScript code in the target’s browser. Exploitation requires high‑privileged authenticated access. Successful exploitation may allow the attacker to access sensitive session data, manipulate trusted content, and disrupt normal application functionality, resulting in a high impact to confidentiality, integrity, and availability.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Jul 21, 2023
over 2 years ago
Last Modified
Feb 13, 2026
7 days ago
Vendor
esri
Product
portal for arcgis
Related Vulnerabilities
An attacker can create a malicious link that, when saved by a user in Esri Portal for ArcGIS, can run harmful JavaScript code in that user's web browser. This can be done by anyone, even without special permissions, as long as they are logged in to the system.
This vulnerability allows an attacker with basic access to create a malicious link that, when clicked by a user, can run harmful JavaScript code in their browser. The attacker only needs to be logged in with low-level permissions, making it relatively easy to exploit.
This vulnerability allows a remote attacker with low-level access to gain unauthorized control over parts of the Esri Portal for ArcGIS software, potentially compromising sensitive data and system operations. It can be exploited under specific conditions, making it difficult but still possible for attackers to bypass security boundaries.
This vulnerability allows an attacker with high-level access to create a malicious link that, when clicked by another user, can run harmful JavaScript in their browser. This could let the attacker steal sensitive information, change site content, or disrupt the site’s normal operations, but it requires the attacker to already have elevated privileges within the system.