CVE-2024-39344: n/a
CVE-2024-39344 is a high-severity vulnerability in the Docusign API package 8. 142. 14 for Salesforce. The vulnerability arises from the Apttus_DocuApi__DocusignAuthentication__mdt object, which stores configuration data insecurely and is accessible to all users by default. This exposure can lead to disclosure of keys that attackers can use to create valid sessions via the Docusign API. Since the session corresponds to an administrator service account, attackers may fully compromise the Docusign account and re-authenticate as specific users. The vulnerability requires low privileges and no user interaction, making exploitation relatively straightforward. No known exploits are currently reported in the wild. Organizations using this package with default settings are at significant risk of unauthorized access and account takeover.
AI Analysis
Technical Summary
CVE-2024-39344 is a vulnerability identified in the Docusign API package version 8.142.14 for Salesforce, specifically involving the Apttus_DocuApi__DocusignAuthentication__mdt metadata object. This object, installed via the Salesforce marketplace, stores sensitive configuration information, including keys, in a manner that is accessible to all users by default. Because of this misconfiguration, unauthorized users can access fields within this object to retrieve components that can be combined to forge a valid session token for the Docusign API. The forged session corresponds to an administrator-level service account, which typically has broad permissions, including the ability to re-authenticate as other users through the same authorization flow. This effectively allows an attacker to impersonate any user within the Docusign environment, leading to a complete compromise of the account. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information) and has a CVSS 3.1 base score of 8.1, indicating high severity. The attack vector is network-based with low attack complexity, requiring only low privileges and no user interaction. Although no public exploits have been reported yet, the potential impact is significant due to the administrative privileges involved. The vulnerability affects organizations using the specified Docusign API package integrated with Salesforce, especially those who have not altered the default access settings of the metadata object.
Potential Impact
The impact of CVE-2024-39344 is substantial for organizations using the vulnerable Docusign API package within Salesforce. Exploitation can lead to unauthorized disclosure of sensitive authentication keys, enabling attackers to create valid administrator-level sessions. This results in a complete compromise of the Docusign account, including the ability to impersonate any user and perform actions on their behalf. Such access can lead to data breaches, unauthorized document signing, manipulation of contracts, and disruption of business processes reliant on Docusign workflows. The compromise of administrator service accounts also undermines trust in the integrity and confidentiality of electronic signature processes. Organizations may face legal, financial, and reputational damage if sensitive contracts or personal data are exposed or altered. Given the integration with Salesforce, a widely used CRM platform, the scope of affected systems can be broad, impacting multiple industries globally.
Mitigation Recommendations
To mitigate CVE-2024-39344, organizations should immediately review and restrict access permissions to the Apttus_DocuApi__DocusignAuthentication__mdt metadata object within Salesforce. Specifically, ensure that this object is not accessible to all users by default and limit access strictly to trusted administrators. Implement the principle of least privilege for all users and service accounts interacting with the Docusign API package. Monitor and audit access logs for any unusual activity related to this object or Docusign API sessions. If possible, update or patch the Docusign API package to a version that addresses this vulnerability once released by the vendor. Additionally, rotate any exposed keys or credentials associated with the Docusign integration. Employ multi-factor authentication (MFA) for administrator accounts and consider using Salesforce Shield or similar tools to enhance monitoring and data protection. Finally, educate administrators and developers about secure configuration practices for third-party packages installed via marketplaces.
Affected Countries
United States, United Kingdom, Canada, Australia, Germany, France, Japan, India, Brazil, Netherlands
CVE-2024-39344: n/a
Description
CVE-2024-39344 is a high-severity vulnerability in the Docusign API package 8. 142. 14 for Salesforce. The vulnerability arises from the Apttus_DocuApi__DocusignAuthentication__mdt object, which stores configuration data insecurely and is accessible to all users by default. This exposure can lead to disclosure of keys that attackers can use to create valid sessions via the Docusign API. Since the session corresponds to an administrator service account, attackers may fully compromise the Docusign account and re-authenticate as specific users. The vulnerability requires low privileges and no user interaction, making exploitation relatively straightforward. No known exploits are currently reported in the wild. Organizations using this package with default settings are at significant risk of unauthorized access and account takeover.
AI-Powered Analysis
Technical Analysis
CVE-2024-39344 is a vulnerability identified in the Docusign API package version 8.142.14 for Salesforce, specifically involving the Apttus_DocuApi__DocusignAuthentication__mdt metadata object. This object, installed via the Salesforce marketplace, stores sensitive configuration information, including keys, in a manner that is accessible to all users by default. Because of this misconfiguration, unauthorized users can access fields within this object to retrieve components that can be combined to forge a valid session token for the Docusign API. The forged session corresponds to an administrator-level service account, which typically has broad permissions, including the ability to re-authenticate as other users through the same authorization flow. This effectively allows an attacker to impersonate any user within the Docusign environment, leading to a complete compromise of the account. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information) and has a CVSS 3.1 base score of 8.1, indicating high severity. The attack vector is network-based with low attack complexity, requiring only low privileges and no user interaction. Although no public exploits have been reported yet, the potential impact is significant due to the administrative privileges involved. The vulnerability affects organizations using the specified Docusign API package integrated with Salesforce, especially those who have not altered the default access settings of the metadata object.
Potential Impact
The impact of CVE-2024-39344 is substantial for organizations using the vulnerable Docusign API package within Salesforce. Exploitation can lead to unauthorized disclosure of sensitive authentication keys, enabling attackers to create valid administrator-level sessions. This results in a complete compromise of the Docusign account, including the ability to impersonate any user and perform actions on their behalf. Such access can lead to data breaches, unauthorized document signing, manipulation of contracts, and disruption of business processes reliant on Docusign workflows. The compromise of administrator service accounts also undermines trust in the integrity and confidentiality of electronic signature processes. Organizations may face legal, financial, and reputational damage if sensitive contracts or personal data are exposed or altered. Given the integration with Salesforce, a widely used CRM platform, the scope of affected systems can be broad, impacting multiple industries globally.
Mitigation Recommendations
To mitigate CVE-2024-39344, organizations should immediately review and restrict access permissions to the Apttus_DocuApi__DocusignAuthentication__mdt metadata object within Salesforce. Specifically, ensure that this object is not accessible to all users by default and limit access strictly to trusted administrators. Implement the principle of least privilege for all users and service accounts interacting with the Docusign API package. Monitor and audit access logs for any unusual activity related to this object or Docusign API sessions. If possible, update or patch the Docusign API package to a version that addresses this vulnerability once released by the vendor. Additionally, rotate any exposed keys or credentials associated with the Docusign integration. Employ multi-factor authentication (MFA) for administrator accounts and consider using Salesforce Shield or similar tools to enhance monitoring and data protection. Finally, educate administrators and developers about secure configuration practices for third-party packages installed via marketplaces.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-06-24T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c87b7ef31ef0b565e84
Added to database: 2/25/2026, 9:41:27 PM
Last enriched: 2/26/2026, 5:55:01 AM
Last updated: 2/26/2026, 9:35:54 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighCVE-2026-28083: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in UX-themes Flatsome
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.