Apache Software Foundation Apache Answer vulnerabilities
11 known vulnerabilities affecting apache_software_foundation/apache_answer.
Total CVEs
11
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH1MEDIUM7LOW2
Vulnerabilities
Page 1 of 1
CVE-2026-24735HIGHCVSS 7.5≤ 1.7.12026-02-04
CVE-2026-24735 [HIGH] CWE-359 CVE-2026-24735: Exposure of Private Personal Information to an Unauthorized Actor vulnerability in Apache Answer.
T
Exposure of Private Personal Information to an Unauthorized Actor vulnerability in Apache Answer.
This issue affects Apache Answer: through 1.7.1.
An unauthenticated API endpoint incorrectly exposes full revision history for deleted content. This allows unauthorized user to retrieve restricted or sensitive information.
Users are recommended to upgra
cvelistv5nvd
CVE-2025-29868MEDIUMCVSS 6.5≤ 1.4.22025-04-01
CVE-2025-29868 [MEDIUM] CWE-495 CVE-2025-29868: Private Data Structure Returned From A Public Method vulnerability in Apache Answer.
This issue aff
Private Data Structure Returned From A Public Method vulnerability in Apache Answer.
This issue affects Apache Answer: through 1.4.2.
If a user uses an externally referenced image, when a user accesses this image, the provider of the image may obtain private information about the ip address of that accessing user.
Users are recommended to upgrade
cvelistv5nvd
CVE-2024-45719LOWCVSS 2.6≤ 1.4.02024-11-22
CVE-2024-45719 [LOW] CWE-326 CVE-2024-45719: Inadequate Encryption Strength vulnerability in Apache Answer.
This issue affects Apache Answer: th
Inadequate Encryption Strength vulnerability in Apache Answer.
This issue affects Apache Answer: through 1.4.0.
The ids generated using the UUID v1 version are to some extent not secure enough. It can cause the generated token to be predictable.
Users are recommended to upgrade to version 1.4.1, which fixes the issue.
cvelistv5nvd
CVE-2024-40761MEDIUMCVSS 5.3≤ 1.3.52024-09-25
CVE-2024-40761 [MEDIUM] CWE-326 CVE-2024-40761: Inadequate Encryption Strength vulnerability in Apache Answer.
This issue affects Apache Answer: th
Inadequate Encryption Strength vulnerability in Apache Answer.
This issue affects Apache Answer: through 1.3.5.
Using the MD5 value of a user's email to access Gravatar is insecure and can lead to the leakage of user email. The official recommendation is to use SHA256 instead.
Users are recommended to upgrade to version 1.4.0, which fixes the issu
cvelistv5nvd
CVE-2024-41888MEDIUMCVSS 5.3≤ 1.3.52024-08-12
CVE-2024-41888 [MEDIUM] CWE-772 CVE-2024-41888: Missing Release of Resource after Effective Lifetime vulnerability in Apache Answer.
This issue aff
Missing Release of Resource after Effective Lifetime vulnerability in Apache Answer.
This issue affects Apache Answer: through 1.3.5.
The password reset link remains valid within its expiration period even after it has been used. This could potentially lead to the link being misused or hijacked.
Users are recommended to upgrade to version 1.3.6, w
cvelistv5nvd
CVE-2024-41890MEDIUMCVSS 5.3≤ 1.3.52024-08-12
CVE-2024-41890 [MEDIUM] CWE-772 CVE-2024-41890: Missing Release of Resource after Effective Lifetime vulnerability in Apache Answer.
This issue aff
Missing Release of Resource after Effective Lifetime vulnerability in Apache Answer.
This issue affects Apache Answer: through 1.3.5.
User sends multiple password reset emails, each containing a valid link. Within the link's validity period, this could potentially lead to the link being misused or hijacked.
Users are recommended to upgrade to vers
cvelistv5nvd
CVE-2024-29217MEDIUMCVSS 4.6fixed in 1.3.02024-04-21
CVE-2024-29217 [MEDIUM] CWE-79 CVE-2024-29217: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability i
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache Answer.This issue affects Apache Answer: before 1.3.0.
XSS attack when user changes personal website. A logged-in user, when modifying their personal website, can input malicious code in the website to create such an attack.
Users are recomme
cvelistv5nvd
CVE-2024-22393CRITICALCVSS 9.1≤ 1.2.12024-02-22
CVE-2024-22393 [CRITICAL] CWE-434 CVE-2024-22393: Unrestricted Upload of File with Dangerous Type vulnerability in Apache Answer.This issue affects Ap
Unrestricted Upload of File with Dangerous Type vulnerability in Apache Answer.This issue affects Apache Answer: through 1.2.1.
Pixel Flood Attack by uploading large pixel files will cause server out of memory. A logged-in user can cause such an attack by uploading an image when posting content.
Users are recommended to upgrade to version [1.2.5]
cvelistv5nvd
CVE-2024-23349MEDIUMCVSS 5.4≤ 1.2.12024-02-22
CVE-2024-23349 [MEDIUM] CWE-79 CVE-2024-23349: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability i
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache Answer.This issue affects Apache Answer: through 1.2.1.
XSS attack when user enters summary. A logged-in user, when modifying their own submitted question, can input malicious code in the summary to create such an attack.
Users are recommend
cvelistv5nvd
CVE-2024-26578MEDIUMCVSS 5.9≤ 1.2.12024-02-22
CVE-2024-26578 [MEDIUM] CWE-362 CVE-2024-26578: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerab
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability in Apache Answer.This issue affects Apache Answer: through 1.2.1.
Repeated submission during registration resulted in the registration of the same user. When users register, if they rapidly submit multiple registrations using scripts, it can re
cvelistv5nvd
CVE-2023-49619LOWCVSS 3.1≤ 1.2.02024-01-10
CVE-2023-49619 [LOW] CWE-362 CVE-2023-49619: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerab
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability in Apache Answer.
This issue affects Apache Answer: through 1.2.0.
Under normal circumstances, a user can only bookmark a question once, and will only increase the number of questions bookmarked once. However, repeat submissions through the scrip
cvelistv5nvd