Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-34090: n/a

0
High
VulnerabilityCVE-2024-34090cvecve-2024-34090
Published: Mon May 06 2024 (05/06/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Archer Platform 6 before 2024.04. There is a stored cross-site scripting (XSS) vulnerability. The login banner in the Archer Control Panel (ACP) did not previously escape content appropriately. 6.14 P3 (6.14.0.3) is also a fixed release.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:07:48 UTC

Technical Analysis

CVE-2024-34090 is a stored cross-site scripting (XSS) vulnerability identified in the Archer Platform, a widely used governance, risk, and compliance (GRC) software solution. The flaw exists in the login banner feature of the Archer Control Panel (ACP), where user-supplied content is not properly sanitized or escaped before rendering. This allows an attacker with low-level privileges to inject malicious JavaScript code that is persistently stored and executed in the context of other users who view the login banner. The vulnerability affects all versions before 2024.04, with a fix implemented in version 6.14 P3 (6.14.0.3). The CVSS 3.1 base score is 7.3, reflecting high severity due to the potential for high impact on confidentiality and integrity, although availability impact is not present. The attack vector is network-based with no authentication required to reach the vulnerable interface, but low privileges are needed to inject the payload, and user interaction is necessary to trigger the script execution. This vulnerability falls under CWE-79 (Improper Neutralization of Input During Web Page Generation). While no active exploits have been reported, the nature of stored XSS makes it a significant risk for targeted attacks, especially in environments where multiple users access the ACP. The vulnerability could be leveraged to steal session tokens, perform unauthorized actions, or deliver further malware payloads within the trusted domain of the Archer Platform.

Potential Impact

The impact of CVE-2024-34090 is significant for organizations using the Archer Platform, particularly those managing sensitive governance, risk, and compliance data. Successful exploitation can lead to the theft of user credentials or session cookies, enabling attackers to impersonate legitimate users and potentially escalate privileges within the ACP. This compromises the confidentiality and integrity of critical organizational data and workflows. Additionally, attackers could execute arbitrary scripts to manipulate the user interface or perform unauthorized actions, potentially disrupting compliance processes or altering risk assessments. Although availability is not directly affected, the indirect consequences of compromised user accounts and data integrity can severely impact organizational operations and trust. Given the platform's role in regulatory compliance and risk management, exploitation could also lead to regulatory penalties and reputational damage. The requirement for low privileges to inject the payload lowers the barrier for insider threats or attackers who have gained limited access, increasing the risk profile.

Mitigation Recommendations

Organizations should immediately upgrade affected Archer Platform instances to version 6.14 P3 (6.14.0.3) or later, where the vulnerability is patched. In environments where immediate patching is not feasible, administrators should restrict access to the Archer Control Panel login banner configuration to trusted personnel only and monitor for suspicious changes. Implementing web application firewalls (WAFs) with rules to detect and block XSS payloads targeting the login banner can provide temporary protection. Additionally, organizations should conduct regular security audits and user activity monitoring to detect anomalous behavior indicative of exploitation attempts. Educating users about the risks of clicking on unexpected or suspicious content within the ACP can reduce the likelihood of successful exploitation. Finally, applying content security policies (CSP) to limit script execution sources may help mitigate the impact of injected scripts if the platform supports such controls.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-30T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c4cb7ef31ef0b56216c

Added to database: 2/25/2026, 9:40:28 PM

Last enriched: 2/28/2026, 3:07:48 AM

Last updated: 4/12/2026, 5:11:58 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses