CVE-2024-39847

Unauthenticated attackers can exploit a weakness in the XML parser functionality of the SOAP endpoints in 4D server. This allows them to obtain read access to files on the application server and adjacent network shares, and perform HTTP GET requests to arbitrary services.
References
Link Resource
https://4d.com Product
https://www.schutzwerk.com/en/blog/schutzwerk-sa-2024-002/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:4d:server:20:r3:*:*:*:*:*:*
cpe:2.3:a:4d:server:20:r4:*:*:*:*:*:*
cpe:2.3:a:4d:server:20:r6:*:*:*:*:*:*

History

05 May 2026, 02:51

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
First Time 4d server
4d
References () https://4d.com - () https://4d.com - Product
References () https://www.schutzwerk.com/en/blog/schutzwerk-sa-2024-002/ - () https://www.schutzwerk.com/en/blog/schutzwerk-sa-2024-002/ - Exploit, Third Party Advisory
CPE cpe:2.3:a:4d:server:20:r4:*:*:*:*:*:*
cpe:2.3:a:4d:server:20:r3:*:*:*:*:*:*
cpe:2.3:a:4d:server:20:r6:*:*:*:*:*:*

30 Apr 2026, 15:48

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-30 07:16

Updated : 2026-05-05 02:51


NVD link : CVE-2024-39847

Mitre link : CVE-2024-39847

CVE.ORG link : CVE-2024-39847


JSON object : View

Products Affected

4d

  • server
CWE
CWE-611

Improper Restriction of XML External Entity Reference