PatchSiren cyber security CVE debrief
CVE-2026-33519 Esri CVE debrief
CVE-2026-33519 is a critical incorrect-authorization vulnerability in Esri Portal for ArcGIS. Esri’s April 2026 security bulletin and the NVD record describe a failure to correctly check permissions assigned to developer credentials. The NVD entry rates the issue CVSS 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating a remotely reachable flaw with potential high impact to confidentiality, integrity, and availability. The vulnerable NVD CPEs enumerate Portal for ArcGIS 11.4, 11.5, and 12.0.
- Vendor
- Esri
- Product
- Portal For Arcgis
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-04-21
- Original CVE updated
- 2026-05-18
- Advisory published
- 2026-04-21
- Advisory updated
- 2026-05-18
Who should care
Administrators, security teams, and monitoring staff responsible for Esri Portal for ArcGIS 11.4, 11.5, or 12.0 deployments should treat this as urgent. This is especially important where developer credentials are used or where Portal for ArcGIS is exposed to broader network access.
Technical summary
The official description says Portal for ArcGIS did not correctly check permissions assigned to developer credentials. NVD maps the issue to CWE-266 and publishes CVSS v3.1 vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The NVD vulnerable CPE list identifies Esri Portal for ArcGIS 11.4, 11.5, and 12.0 as affected.
Defensive priority
Immediate
Recommended defensive actions
- Inventory all Esri Portal for ArcGIS installations and confirm whether any instance is running 11.4, 11.5, or 12.0.
- Review Esri’s April 2026 security bulletin and apply the vendor’s recommended remediation as soon as it is available.
- Limit and audit use of developer credentials until affected systems are remediated.
- Review authentication and authorization logs for unexpected developer-credential activity or unusual privilege use.
- If remediation is delayed, reduce exposure of administrative interfaces and keep access tightly restricted to trusted management paths.
Evidence notes
Based only on the supplied official sources: the NVD record for CVE-2026-33519 and Esri’s April 2026 security bulletin reference. NVD marks the vulnerability status as analyzed, lists CVSS 9.8 with vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, and identifies CWE-266. The supplied enrichment marks isKev=false and provides no CISA KEV dates.
Official resources
-
CVE-2026-33519 CVE record
CVE.org
-
CVE-2026-33519 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
Publicly disclosed on 2026-04-21 in the Esri bulletin and NVD record; the NVD entry was last modified on 2026-05-18. No CISA KEV listing is included in the supplied enrichment.