Use of GET Request Method With Sensitive Query Strings vulnerability in Apache OpenMeetings. The REST login endpoint uses HTTP GET method with username and password passed as query parameters. Please check references regarding possible impact This issue affects Apache OpenMeetings: from 3.1.3 before 9.0.0. Users are recommended to upgrade to version 9.0.0, which fixes the issue.
History

Wed, 15 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:apache:openmeetings:*:*:*:*:*:*:*:*

Fri, 10 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache openmeetings
Vendors & Products Apache
Apache openmeetings

Thu, 09 Apr 2026 17:30:00 +0000

Type Values Removed Values Added
References

Thu, 09 Apr 2026 16:00:00 +0000

Type Values Removed Values Added
Description Use of GET Request Method With Sensitive Query Strings vulnerability in Apache OpenMeetings. The REST login endpoint uses HTTP GET method with username and password passed as query parameters. Please check references regarding possible impact This issue affects Apache OpenMeetings: from 3.1.3 before 9.0.0. Users are recommended to upgrade to version 9.0.0, which fixes the issue.
Title Apache OpenMeetings: Login Credentials Passed via GET Query Parameters
Weaknesses CWE-598
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published: 2026-04-09T15:52:06.599Z

Updated: 2026-04-10T20:13:47.789Z

Reserved: 2026-03-25T09:32:35.406Z

Link: CVE-2026-34020

cve-icon Vulnrichment

Updated: 2026-04-09T16:29:22.642Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-09T16:16:27.090

Modified: 2026-04-15T15:21:20.030

Link: CVE-2026-34020

cve-icon Redhat

No data.