Unauthenticated attackers can exploit a weakness in the XML parser functionality of the SOAP endpoints in 4D server. This allows them to obtain read access to files on the application server and adjacent network shares, and perform HTTP GET requests to arbitrary services.
References
| Link | Resource |
|---|---|
| https://4d.com | Product |
| https://www.schutzwerk.com/en/blog/schutzwerk-sa-2024-002/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
05 May 2026, 02:51
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| First Time |
4d server
4d |
|
| References | () https://4d.com - Product | |
| References | () https://www.schutzwerk.com/en/blog/schutzwerk-sa-2024-002/ - Exploit, Third Party Advisory | |
| CPE | cpe:2.3:a:4d:server:20:r4:*:*:*:*:*:* cpe:2.3:a:4d:server:20:r3:*:*:*:*:*:* cpe:2.3:a:4d:server:20:r6:*:*:*:*:*:* |
30 Apr 2026, 15:48
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-30 07:16
Updated : 2026-05-05 02:51
NVD link : CVE-2024-39847
Mitre link : CVE-2024-39847
CVE.ORG link : CVE-2024-39847
JSON object : View
Products Affected
4d
- server
CWE
CWE-611
Improper Restriction of XML External Entity Reference
