Unauthenticated attackers can exploit a weakness in the XML parser functionality of the SOAP endpoints in 4D server. This allows them to obtain read access to files on the application server and adjacent network shares, and perform HTTP GET requests to arbitrary services.
Advisories
No advisories yet.
Fixes
Solution
Update to 4D Server 20 R7 or higher.
Workaround
No workaround given by the vendor.
References
History
Thu, 30 Apr 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
4d server
|
|
| Vendors & Products |
4d server
|
Thu, 30 Apr 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Unauthenticated attackers can exploit a weakness in the XML parser functionality of the SOAP endpoints in 4D server. This allows them to obtain read access to files on the application server and adjacent network shares, and perform HTTP GET requests to arbitrary services. | |
| Title | Arbitrary File Read and Server Side Request Forgery via XML External Entities in 4D Server SOAP | |
| First Time appeared |
4d
4d 4d Server |
|
| Weaknesses | CWE-611 | |
| CPEs | cpe:2.3:a:4d:4d_server:*:*:windows:*:*:*:*:* cpe:2.3:a:4d:4d_server:v20_r7:*:windows:*:*:*:*:* |
|
| Vendors & Products |
4d
4d 4d Server |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: SCHUTZWERK
Published:
Updated: 2026-04-30T07:10:17.999Z
Reserved: 2024-06-29T20:55:54.740Z
Link: CVE-2024-39847
No data.
Status : Received
Published: 2026-04-30T07:16:36.143
Modified: 2026-04-30T07:16:36.143
Link: CVE-2024-39847
No data.
OpenCVE Enrichment
Updated: 2026-04-30T08:20:13Z
Weaknesses