Description
Exposure of Private Personal Information to an Unauthorized Actor vulnerability in Apache Answer.

This issue affects Apache Answer: through 1.7.1.

An unauthenticated API endpoint incorrectly exposes full revision history for deleted content. This allows unauthorized user to retrieve restricted or sensitive information.
Users are recommended to upgrade to version 2.0.0, which fixes the issue.
Published: 2026-02-04
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Patch
AI Analysis

Impact

An unauthenticated API endpoint in Apache Answer incorrectly exposes the full revision history for deleted content, allowing an unauthorized user to retrieve restricted or sensitive personal information. This flaw is identified as CWE‑359 (Information Exposure Through an Insecure API), leading to the leakage of private data. The vulnerability does not allow code execution or system compromise, but the data exposed can be highly confidential to users of the platform.

Affected Systems

The vulnerability affects all Apache Answer releases up to and including version 1.7.1. Users running these versions are exposed to the insecure revision history endpoint. Upgrading to version 2.0.0 or later resolves the issue and removes the exposed endpoint.

Risk and Exploitability

The vulnerability carries a CVSS score of 7.5, indicating a high likelihood of impact if exploited. The EPSS score is less than 1%, suggesting a low probability that attackers currently target this weakness. The CVE is not listed in the CISA KEV catalog. Attackers can reach the vulnerable endpoint without authentication, simply by sending an HTTP request to the revision API; no special privileges or credentials are required. Because the attack vector relies solely on a publicly available endpoint, it is straightforward to exploit in the absence of additional protective controls.

Generated by OpenCVE AI on April 17, 2026 at 23:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor‑issued upgrade to Apache Answer 2.0.0 or newer, which removes the insecure revision history endpoint.
  • Configure the web application or load balancer to require authentication and proper authorization for any Revision API request, preventing unauthorized users from accessing revision data.
  • Implement monitoring of API traffic to detect anomalous or repeated access attempts to the Revision endpoint and set alerts for potential exploitation attempts.

Generated by OpenCVE AI on April 17, 2026 at 23:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-5w5r-8xc6-2xhw Apache Answer Exposure of Private Personal Information to an Unauthorized Actor vulnerability
History

Fri, 06 Feb 2026 14:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:apache:answer:*:*:*:*:*:*:*:*

Wed, 04 Feb 2026 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache answer
Vendors & Products Apache
Apache answer

Wed, 04 Feb 2026 19:30:00 +0000

Type Values Removed Values Added
References

Wed, 04 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Feb 2026 11:15:00 +0000

Type Values Removed Values Added
Description Exposure of Private Personal Information to an Unauthorized Actor vulnerability in Apache Answer. This issue affects Apache Answer: through 1.7.1. An unauthenticated API endpoint incorrectly exposes full revision history for deleted content. This allows unauthorized user to retrieve restricted or sensitive information. Users are recommended to upgrade to version 2.0.0, which fixes the issue.
Title Apache Answer: Revision API Improper Access Control leads to Information Disclosure
Weaknesses CWE-359
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2026-02-04T18:15:12.318Z

Reserved: 2026-01-26T16:04:07.853Z

Link: CVE-2026-24735

cve-icon Vulnrichment

Updated: 2026-02-04T18:15:12.318Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-04T11:16:03.130

Modified: 2026-02-06T14:40:37.130

Link: CVE-2026-24735

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T00:00:09Z

Weaknesses