CVE-2026-1446
📋 TL;DR
A Cross-Site Scripting (XSS) vulnerability in Esri ArcGIS Pro versions 3.6.0 and earlier allows local attackers to execute arbitrary JavaScript code within the application. This affects users running vulnerable versions of ArcGIS Pro on their local workstations. Exploitation requires local user access but no special privileges.
💻 Affected Systems
- Esri ArcGIS Pro
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Local attacker gains ability to execute arbitrary JavaScript within ArcGIS Pro context, potentially leading to data theft, privilege escalation, or further system compromise.
Likely Case
Local user with malicious intent could execute scripts to steal sensitive GIS data, modify project files, or disrupt workflows.
If Mitigated
With proper patching, risk is eliminated; with workarounds, risk is reduced but not completely removed.
🎯 Exploit Status
Exploitation requires local user access and specific user interaction with malicious content in a dialog.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.6.1
Vendor Advisory: https://www.esri.com/arcgis-blog/products/arcgis-pro/administration/arcgis-pro-3-6-1-patch
Restart Required: Yes
Instructions:
1. Download ArcGIS Pro 3.6.1 from Esri's website or ArcGIS Pro installer. 2. Run the installer. 3. Follow installation prompts. 4. Restart ArcGIS Pro after installation completes.
🔧 Temporary Workarounds
Restrict local user access
windowsLimit ArcGIS Pro access to trusted users only and implement least privilege principles.
User awareness training
allTrain users not to interact with suspicious content in ArcGIS Pro dialogs.
🧯 If You Can't Patch
- Restrict ArcGIS Pro usage to essential personnel only
- Implement application whitelisting to prevent unauthorized script execution
🔍 How to Verify
Check if Vulnerable:
Check ArcGIS Pro version in Help > About ArcGIS Pro dialog.
Check Version:
Not applicable - check via ArcGIS Pro GUI Help > About menu.
Verify Fix Applied:
Verify version shows 3.6.1 or later in Help > About ArcGIS Pro.
📡 Detection & Monitoring
Log Indicators:
- Unusual ArcGIS Pro process behavior
- Multiple failed dialog interactions
Network Indicators:
- No network indicators - local vulnerability
SIEM Query:
Not applicable - local desktop application vulnerability