Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-34091: n/a

0
High
VulnerabilityCVE-2024-34091cvecve-2024-34091
Published: Mon May 06 2024 (05/06/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Archer Platform 6 before 2024.04. There is a stored cross-site scripting (XSS) vulnerability. A remote authenticated malicious Archer user could potentially exploit this vulnerability to store malicious HTML or JavaScript code in a trusted application data store. When victim users access the data store through their browsers, the malicious code gets executed in the background of the application and renders content inaccessible. 6.14 P3 (6.14.0.3) is also a fixed release.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:07:58 UTC

Technical Analysis

CVE-2024-34091 is a stored cross-site scripting (XSS) vulnerability identified in the Archer Platform, a widely used governance, risk, and compliance (GRC) software solution. This vulnerability exists in versions prior to 2024.04 and 6.14.0.3. The flaw allows a remote attacker with authenticated access—albeit with low privileges—to inject malicious HTML or JavaScript code into trusted application data stores. When other users access these data stores through their browsers, the injected code executes within the context of the application, leading to unauthorized script execution. This can result in the rendering of content inaccessible, theft of session tokens, or manipulation of displayed data, thereby compromising confidentiality and integrity of the application. The attack requires user interaction in the form of viewing the compromised data but does not require elevated privileges beyond authenticated user status. The vulnerability is tracked under CWE-79 (Improper Neutralization of Input During Web Page Generation). The CVSS v3.1 base score is 7.3, reflecting high severity due to the potential impact on confidentiality and integrity, ease of exploitation with low privileges, and the scope limited to the vulnerable application. No public exploits have been reported yet, but the availability of a fixed release (6.14.0.3) indicates the vendor's acknowledgment and remediation of the issue.

Potential Impact

The impact of CVE-2024-34091 on organizations using Archer Platform can be significant. Successful exploitation can lead to unauthorized script execution within users' browsers, potentially allowing attackers to steal session cookies, perform actions on behalf of users, or disrupt application functionality by rendering content inaccessible. This compromises the confidentiality and integrity of sensitive governance and risk management data, which may include compliance reports, risk assessments, and audit information. The disruption of access to critical GRC data can affect decision-making and regulatory compliance efforts. Since the vulnerability requires only low-level authenticated access, insider threats or compromised user accounts can be leveraged to exploit this flaw. The lack of known exploits in the wild currently reduces immediate risk, but the high severity score and the critical nature of the affected platform necessitate prompt remediation to prevent potential targeted attacks.

Mitigation Recommendations

To mitigate CVE-2024-34091, organizations should immediately upgrade affected Archer Platform instances to version 2024.04 or later, or apply the 6.14.0.3 fixed release if using the 6.14 branch. In addition to patching, implement strict input validation and output encoding on all user-supplied data fields to prevent injection of malicious scripts. Limit authenticated user privileges to the minimum necessary to reduce the risk of exploitation by low-privilege users. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the application context. Monitor application logs for unusual input patterns or repeated failed attempts to inject scripts. Conduct regular security awareness training for users to recognize and report suspicious behavior. Finally, consider deploying web application firewalls (WAFs) with rules tuned to detect and block XSS payloads targeting the Archer Platform.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-30T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c4cb7ef31ef0b562170

Added to database: 2/25/2026, 9:40:28 PM

Last enriched: 2/28/2026, 3:07:58 AM

Last updated: 4/12/2026, 3:41:00 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses