{"api_version":"1","generated_at":"2026-04-09T20:36:26+00:00","cve":"CVE-2026-34020","urls":{"html":"https://cve.report/CVE-2026-34020","api":"https://cve.report/api/cve/CVE-2026-34020.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-34020","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-34020"},"summary":{"title":"Apache OpenMeetings: Login Credentials Passed via GET Query Parameters","description":"Use of GET Request Method With Sensitive Query Strings vulnerability in Apache OpenMeetings.\n\nThe REST login endpoint uses HTTP GET method with username and password passed as query parameters. Please check references regarding possible impact\n\n\nThis issue affects Apache OpenMeetings: from 3.1.3 before 9.0.0.\n\nUsers are recommended to upgrade to version 9.0.0, which fixes the issue.","state":"PUBLISHED","assigner":"apache","published_at":"2026-04-09 16:16:27","updated_at":"2026-04-09 17:16:25"},"problem_types":["CWE-598","CWE-598 CWE-598 Use of GET Request Method With Sensitive Query Strings"],"metrics":[],"references":[{"url":"https://owasp.org/www-community/vulnerabilities/Information_exposure_through_query_strings_in_url","name":"https://owasp.org/www-community/vulnerabilities/Information_exposure_through_query_strings_in_url","refsource":"security@apache.org","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://lists.apache.org/thread/2h3h9do5tp17xldr0nps1yjmkx4vs3db","name":"https://lists.apache.org/thread/2h3h9do5tp17xldr0nps1yjmkx4vs3db","refsource":"security@apache.org","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://www.openwall.com/lists/oss-security/2026/04/09/12","name":"http://www.openwall.com/lists/oss-security/2026/04/09/12","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-34020","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-34020","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Apache Software Foundation","product":"Apache OpenMeetings","version":"affected 3.1.3 9.0.0 semver","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"4ra2n (A code security AI agent)","lang":"en"}],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2026-04-09T16:29:22.642Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"url":"http://www.openwall.com/lists/oss-security/2026/04/09/12"}],"title":"CVE Program Container"}],"cna":{"affected":[{"defaultStatus":"unaffected","product":"Apache OpenMeetings","vendor":"Apache Software Foundation","versions":[{"lessThan":"9.0.0","status":"affected","version":"3.1.3","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"4ra2n (A code security AI agent)"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Use of GET Request Method With Sensitive Query Strings vulnerability in Apache OpenMeetings.</p><p>The REST login endpoint uses HTTP GET method with username and password passed as query parameters.&nbsp;<span style=\"background-color: rgb(255, 255, 255);\">Please check references regarding possible impact</span><br></p><p>This issue affects Apache OpenMeetings: from 3.1.3 before 9.0.0.</p><p>Users are recommended to upgrade to version 9.0.0, which fixes the issue.</p>"}],"value":"Use of GET Request Method With Sensitive Query Strings vulnerability in Apache OpenMeetings.\n\nThe REST login endpoint uses HTTP GET method with username and password passed as query parameters. Please check references regarding possible impact\n\n\nThis issue affects Apache OpenMeetings: from 3.1.3 before 9.0.0.\n\nUsers are recommended to upgrade to version 9.0.0, which fixes the issue."}],"metrics":[{"other":{"content":{"text":"moderate"},"type":"Textual description of severity"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-598","description":"CWE-598 Use of GET Request Method With Sensitive Query Strings","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-09T15:52:06.599Z","orgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","shortName":"apache"},"references":[{"tags":["related"],"url":"https://owasp.org/www-community/vulnerabilities/Information_exposure_through_query_strings_in_url"},{"tags":["vendor-advisory"],"url":"https://lists.apache.org/thread/2h3h9do5tp17xldr0nps1yjmkx4vs3db"}],"source":{"defect":["OPENMEETINGS-2816"],"discovery":"EXTERNAL"},"title":"Apache OpenMeetings: Login Credentials Passed via GET Query Parameters","x_generator":{"engine":"Vulnogram 0.2.0"}}},"cveMetadata":{"assignerOrgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","assignerShortName":"apache","cveId":"CVE-2026-34020","datePublished":"2026-04-09T15:52:06.599Z","dateReserved":"2026-03-25T09:32:35.406Z","dateUpdated":"2026-04-09T16:29:22.642Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-09 16:16:27","lastModifiedDate":"2026-04-09 17:16:25","problem_types":["CWE-598","CWE-598 CWE-598 Use of GET Request Method With Sensitive Query Strings"],"metrics":[],"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"34020","Ordinal":"1","Title":"Apache OpenMeetings: Login Credentials Passed via GET Query Para","CVE":"CVE-2026-34020","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"34020","Ordinal":"1","NoteData":"Use of GET Request Method With Sensitive Query Strings vulnerability in Apache OpenMeetings.\n\nThe REST login endpoint uses HTTP GET method with username and password passed as query parameters. Please check references regarding possible impact\n\n\nThis issue affects Apache OpenMeetings: from 3.1.3 before 9.0.0.\n\nUsers are recommended to upgrade to version 9.0.0, which fixes the issue.","Type":"Description","Title":"Apache OpenMeetings: Login Credentials Passed via GET Query Para"}]}}}