Apache Answer
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Apache Answer.
By the Year
In 2025 there have been 1 vulnerability in Apache Answer. Last year, in 2024 Answer had 9 security vulnerabilities published. Right now, Answer is on track to have less security vulnerabilities in 2025 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2025 | 1 | 0.00 |
| 2024 | 9 | 5.00 |
It may take a day or so for new Answer vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Apache Answer Security Vulnerabilities
Private IP Disclosure via Public Method in Apache Answer <=1.4.2
CVE-2025-29868
- April 01, 2025
Private Data Structure Returned From A Public Method vulnerability in Apache Answer. This issue affects Apache Answer: through 1.4.2. If a user uses an externally referenced image, when a user accesses this image, the provider of the image may obtain private information about the ip address of that accessing user. Users are recommended to upgrade to version 1.4.5, which fixes the issue. In the new version, administrators can set whether external content can be displayed.
Private Data Structure Returned From A Public Method
Apache Answer Inadequate Encryption Strength via UUID v1 (v1.4.0)
CVE-2024-45719
- November 22, 2024
Inadequate Encryption Strength vulnerability in Apache Answer. This issue affects Apache Answer: through 1.4.0. The ids generated using the UUID v1 version are to some extent not secure enough. It can cause the generated token to be predictable. Users are recommended to upgrade to version 1.4.1, which fixes the issue.
Apache Answer <1.4.0 MD5 Gravatar Leakage Inadequate Encryption Strength
CVE-2024-40761
- September 25, 2024
Inadequate Encryption Strength vulnerability in Apache Answer. This issue affects Apache Answer: through 1.3.5. Using the MD5 value of a user's email to access Gravatar is insecure and can lead to the leakage of user email. The official recommendation is to use SHA256 instead. Users are recommended to upgrade to version 1.4.0, which fixes the issue.
Apache Answer 1.3.5: Missing Resource Release in Password Reset Emails
CVE-2024-41890
5.3 - Medium
- August 12, 2024
Missing Release of Resource after Effective Lifetime vulnerability in Apache Answer. This issue affects Apache Answer: through 1.3.5. User sends multiple password reset emails, each containing a valid link. Within the link's validity period, this could potentially lead to the link being misused or hijacked. Users are recommended to upgrade to version 1.3.6, which fixes the issue.
Missing Release of Resource after Effective Lifetime
Apache Answer <1.3.5: Reused Password Reset Links After Use (CVE-2024-41888)
CVE-2024-41888
5.3 - Medium
- August 12, 2024
Missing Release of Resource after Effective Lifetime vulnerability in Apache Answer. This issue affects Apache Answer: through 1.3.5. The password reset link remains valid within its expiration period even after it has been used. This could potentially lead to the link being misused or hijacked. Users are recommended to upgrade to version 1.3.6, which fixes the issue.
Missing Release of Resource after Effective Lifetime
Apache Answer XSS via Personal Website Input before 1.3.0
CVE-2024-29217
- April 21, 2024
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache Answer.This issue affects Apache Answer: before 1.3.0. XSS attack when user changes personal website. A logged-in user, when modifying their personal website, can input malicious code in the website to create such an attack. Users are recommended to upgrade to version [1.3.0], which fixes the issue.
XSS
Apache Answer Race Condition Allows Duplicate User Registration before 1.2.5
CVE-2024-26578
5.9 - Medium
- February 22, 2024
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability in Apache Answer.This issue affects Apache Answer: through 1.2.1. Repeated submission during registration resulted in the registration of the same user. When users register, if they rapidly submit multiple registrations using scripts, it can result in the creation of multiple user accounts simultaneously with the same name. Users are recommended to upgrade to version [1.2.5], which fixes the issue.
Race Condition
Apache Answer 1.2.x XSS via Summary Input (Pre-1.2.5)
CVE-2024-23349
5.4 - Medium
- February 22, 2024
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache Answer.This issue affects Apache Answer: through 1.2.1. XSS attack when user enters summary. A logged-in user, when modifying their own submitted question, can input malicious code in the summary to create such an attack. Users are recommended to upgrade to version [1.2.5], which fixes the issue.
Apache Answer 1.2.1 Unrestricted Dangerous File Upload Pixel Flood OOM
CVE-2024-22393
- February 22, 2024
Unrestricted Upload of File with Dangerous Type vulnerability in Apache Answer.This issue affects Apache Answer: through 1.2.1. Pixel Flood Attack by uploading large pixel files will cause server out of memory. A logged-in user can cause such an attack by uploading an image when posting content. Users are recommended to upgrade to version [1.2.5], which fixes the issue.
Unrestricted File Upload
Apache Answer 1.2.x Race Condition on Bookmarking
CVE-2023-49619
3.1 - Low
- January 10, 2024
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability in Apache Answer. This issue affects Apache Answer: through 1.2.0. Under normal circumstances, a user can only bookmark a question once, and will only increase the number of questions bookmarked once. However, repeat submissions through the script can increase the number of collection of the question many times. Users are recommended to upgrade to version [1.2.1], which fixes the issue.
Race Condition
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Apache Answer or by Apache? Click the Watch button to subscribe.