Description
There is a Cross‑Site Scripting (XSS) issue in Esri ArcGIS Pro versions 3.6.0 and earlier. ArcGIS Pro is a desktop application, and exploitation is limited to local users interacting with the application; no privileged role or elevated permissions are required beyond standard local user access. A local attacker can supply malicious strings that may be rendered and executed when a specific dialog within ArcGIS Pro is opened. This issue is fixed in ArcGIS Pro version 3.6.1.
Published: 2026-01-26
Score: 5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Local XSS
Action: Upgrade
AI Analysis

Impact

Cross‑Site Scripting (XSS) vulnerability exists in Esri ArcGIS Pro versions 3.6.0 and earlier. The flaw allows a local user to inject and execute arbitrary JavaScript when a particular dialog box is opened, without requiring elevated privileges or remote access. Because the vulnerable code runs in the context of the user, an attacker who can supply a crafted string could compromise the current user's confidentiality, integrity, or availability of the application data. The weakness is identified as CWE‑79.

Affected Systems

This issue affects the Esri ArcGIS Pro desktop application for Windows, specifically all releases 3.6.0 and earlier. The affected products are listed under the Esri:ArcGIS Pro vendor/product name, and the vulnerability impacts any installation that matches that product naming. No other Esri products were mentioned in the advisory.

Risk and Exploitability

The CVSS base score of 5.0 indicates moderate severity, while the EPSS score of less than 1% indicates a very low likelihood of exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalog. Exploitation requires a local attacker who can supply a malicious string that is rendered by the dialog; no privileged or remote access is necessary. Consequently, the risk is limited to the local user’s session, yet it remains significant because successful exploitation could allow arbitrary code execution within that environment.

Generated by OpenCVE AI on April 18, 2026 at 15:01 UTC.

Remediation

Vendor Solution

Upgrade to ArcGIS Pro 3.6.1


OpenCVE Recommended Actions

  • Upgrade Esri ArcGIS Pro to version 3.6.1 or later, which removes the XSS flaw.
  • Avoid opening the vulnerable dialog or use only trusted content until the application is upgraded.
  • If available, configure the application to block script execution or enforce input sanitization for the dialog contents to reduce the risk of script execution.

Generated by OpenCVE AI on April 18, 2026 at 15:01 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 06 Feb 2026 06:30:00 +0000

Type Values Removed Values Added
Description There is a Cross Site Scripting issue in Esri ArcGIS Pro versions 3.6.0 and earlier. A local attacker could supply malicious strings into ArcGIS Pro which may execute when a specific dialog is opened. This issue is fixed in ArcGIS Pro 3.6.1. There is a Cross‑Site Scripting (XSS) issue in Esri ArcGIS Pro versions 3.6.0 and earlier. ArcGIS Pro is a desktop application, and exploitation is limited to local users interacting with the application; no privileged role or elevated permissions are required beyond standard local user access. A local attacker can supply malicious strings that may be rendered and executed when a specific dialog within ArcGIS Pro is opened. This issue is fixed in ArcGIS Pro version 3.6.1.
Title XSS issue is Esri ArcGIS Pro versions 3.6.0 and earlier

Mon, 02 Feb 2026 13:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:esri:arcgis_pro:*:*:*:*:*:*:*:*

Tue, 27 Jan 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Esri
Esri arcgis Pro
Vendors & Products Esri
Esri arcgis Pro

Mon, 26 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 17:45:00 +0000

Type Values Removed Values Added
Description There is a Cross Site Scripting issue in Esri ArcGIS Pro versions 3.6.0 and earlier. A local attacker could supply malicious strings into ArcGIS Pro which may execute when a specific dialog is opened. This issue is fixed in ArcGIS Pro 3.6.1.
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Esri

Published:

Updated: 2026-02-06T06:04:15.645Z

Reserved: 2026-01-26T16:40:43.410Z

Link: CVE-2026-1446

cve-icon Vulnrichment

Updated: 2026-01-26T21:03:38.028Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-26T18:16:30.140

Modified: 2026-02-13T19:41:55.783

Link: CVE-2026-1446

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T15:15:03Z

Weaknesses