VYPR
Low severity3.5NVD Advisory· Published Apr 30, 2024· Updated Apr 15, 2026

CVE-2024-4327

CVE-2024-4327

Description

A vulnerability was found in Apryse WebViewer up to 10.8.0. It has been classified as problematic. This affects an unknown part of the component PDF Document Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 10.9 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-262419. NOTE: The vendor was contacted early about this disclosure and explains that the documentation recommends a strict Content Security Policy and the issue was fixed in release 10.9.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Apryse WebViewer ≤10.8.0 has a stored/reflected XSS in the PDF Document Handler, fixed in 10.9; a strict CSP is recommended.

Vulnerability

Overview

CVE-2024-4327 is a problematic cross-site scripting (XSS) vulnerability found in Apryse WebViewer up to version 10.8.0. The flaw affects the PDF Document Handler component and can be triggered remotely. The vendor was contacted early and explains that the issue is addressed in release 10.9, and that a strict Content Security Policy (CSP) is recommended as a defense-in-depth measure [1].

Attack

Vector and Exploitation

The manipulation leads to XSS, but the description does not detail the specific input vector (e.g., stored or reflected). The attack requires no authentication and can be initiated over the network. An exploit has been disclosed publicly, increasing the risk of widespread use. The vendor's CSP documentation indicates that improper CSP settings (e.g., allowing unsafe-inline or unsafe-eval for script-src) can leave WebViewer vulnerable to such attacks [1].

Impact

Successful exploitation could allow an attacker to execute arbitrary JavaScript in the context of a user's session. This could lead to data theft, session hijacking, or other client-side attacks. The CVSS score of 3.5 (Low) reflects the need for user interaction or specific configurations, but the public disclosure elevates the practical risk.

Mitigation

Apryse released WebViewer 10.9 to fix the XSS vulnerability. Users should upgrade immediately. Additionally, applying the recommended strict CSP (e.g., script-src 'self' 'wasm-unsafe-eval' blob: without unsafe-inline) can mitigate exploitation in versions that cannot be upgraded immediately [1]. No workaround other than upgrading or enforcing CSP is documented.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.