Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-41706: n/a

0
High
VulnerabilityCVE-2024-41706cvecve-2024-41706
Published: Thu Jul 25 2024 (07/25/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

A stored XSS issue was discovered in Archer Platform 6 before version 2024.06. A remote authenticated malicious Archer user could potentially exploit this to store malicious HTML or JavaScript code in a trusted application data store. When victim users access the data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable application. 6.14 P4 (6.14.0.4) is also a fixed release.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 05:51:59 UTC

Technical Analysis

CVE-2024-41706 is a stored cross-site scripting (XSS) vulnerability identified in the Archer Platform, a widely used governance, risk, and compliance (GRC) software solution. The flaw exists in versions prior to 2024.06 and 6.14 P4 (6.14.0.4). An authenticated attacker with low privileges can inject malicious HTML or JavaScript code into a trusted application data store within Archer. This malicious content is then stored persistently and executed in the browsers of other users who access the compromised data, allowing the attacker to perform actions within the security context of the victim’s session. The vulnerability leverages CWE-79 (Improper Neutralization of Input During Web Page Generation), a common web application security issue. The CVSS 3.1 base score is 7.3, reflecting high impact on confidentiality and integrity, with an attack vector of network, low attack complexity, and requiring authentication and user interaction. While no public exploits are currently known, the nature of stored XSS can facilitate session hijacking, credential theft, or unauthorized actions, making it a significant risk for organizations relying on Archer for sensitive risk and compliance data management.

Potential Impact

The impact of CVE-2024-41706 is considerable for organizations using the Archer Platform, especially those managing sensitive governance, risk, and compliance data. Successful exploitation can lead to unauthorized disclosure of confidential information, session hijacking, and potential privilege escalation if attackers leverage the XSS to perform actions on behalf of legitimate users. The persistent nature of stored XSS means multiple users can be affected once malicious code is injected. This can undermine trust in the platform, disrupt business operations, and expose organizations to regulatory and compliance risks. Given Archer’s role in managing critical risk data, the compromise could have cascading effects on organizational security posture and decision-making processes. The requirement for authentication limits the attack surface but does not eliminate risk, as insider threats or compromised accounts could be leveraged to exploit this vulnerability.

Mitigation Recommendations

Organizations should immediately upgrade affected Archer Platform instances to version 2024.06 or 6.14 P4 (6.14.0.4) where the vulnerability is patched. In the interim, implement strict input validation and output encoding on all user-supplied data fields to prevent injection of malicious scripts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the application context. Conduct thorough user privilege reviews to minimize the number of users with write access to data stores. Monitor application logs for unusual input patterns or script injections. Educate users about the risks of clicking on suspicious links or interacting with untrusted content within the platform. Additionally, consider deploying web application firewalls (WAFs) with rules tuned to detect and block XSS payloads targeting Archer. Regularly audit and sanitize stored data to remove any injected malicious content.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-07-22T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cbeb7ef31ef0b568a7a

Added to database: 2/25/2026, 9:42:22 PM

Last enriched: 2/28/2026, 5:51:59 AM

Last updated: 4/12/2026, 11:46:51 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses