The vulnerability affects only the client side navigation logic during authentication and remains confined to the same security boundary. No server side compromise or cross component impact is possible. This issue affects ArcGIS Server 11.5.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 20 May 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Esri
Esri arcgis Server |
|
| Weaknesses | CWE-601 | |
| Vendors & Products |
Esri
Esri arcgis Server |
Wed, 20 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 20 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ArcGIS Server contains an input validation weakness in the login redirection workflow. An Authenticated attacker could exploit this issue by sending a specially crafted request, Successful exploitation may result in the application redirecting the browser to an unintended, untrusted site, resulting in a limited confidentiality impact under specific user interaction conditions. The vulnerability affects only the client side navigation logic during authentication and remains confined to the same security boundary. No server side compromise or cross component impact is possible. This issue affects ArcGIS Server 11.5. | |
| Title | Unvalidated Redirect in ArcGIS Server | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Esri
Published:
Updated: 2026-05-20T19:29:23.736Z
Reserved: 2026-02-19T16:37:23.274Z
Link: CVE-2026-2813
Updated: 2026-05-20T19:29:19.935Z
Status : Received
Published: 2026-05-20T20:16:37.087
Modified: 2026-05-20T20:16:37.087
Link: CVE-2026-2813
No data.
OpenCVE Enrichment
Updated: 2026-05-20T20:30:39Z