CVE-2026-24735

7.5 HIGH

📋 TL;DR

An unauthenticated API endpoint in Apache Answer exposes full revision history for deleted content, allowing unauthorized users to retrieve sensitive information. This affects all Apache Answer installations through version 1.7.1. The vulnerability enables access to restricted data that should remain private.

💻 Affected Systems

Products:
  • Apache Answer
Versions: through 1.7.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerable endpoint is accessible without authentication.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Mass exposure of sensitive personal information, deleted confidential content, or private user data leading to regulatory violations and reputational damage.

🟠

Likely Case

Unauthorized access to deleted posts, comments, or user information that could contain personal details or sensitive discussions.

🟢

If Mitigated

Limited exposure if system contains minimal sensitive data or if network controls block unauthenticated API access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and involves simple API calls. Attack tools could easily be developed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.0

Vendor Advisory: https://lists.apache.org/thread/whxloom7mpxlyt5wzdskflsg5mzdzd60

Restart Required: Yes

Instructions:

1. Backup your Apache Answer installation and database. 2. Download Apache Answer 2.0.0 from the official Apache website. 3. Replace the existing installation with version 2.0.0 files. 4. Restart the Apache Answer service or web server. 5. Verify the upgrade was successful.

🔧 Temporary Workarounds

Block Unauthenticated API Access

all

Configure web server or firewall rules to block unauthenticated access to the vulnerable API endpoint

# Example nginx location block
location ~ ^/api/.*$ {
    auth_basic "Restricted";
    auth_basic_user_file /etc/nginx/.htpasswd;
}

Disable Revision History API

all

Modify Apache Answer configuration to disable the revision history functionality

# Edit config file to disable revision API
# Set revision.enabled=false in application configuration

🧯 If You Can't Patch

  • Implement strict network access controls to limit API endpoint access to authorized users only
  • Monitor API access logs for suspicious patterns and unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Attempt to access the revision history API endpoint without authentication. If it returns deleted content, the system is vulnerable.

Check Version:

Check the version in the admin panel or examine the application's version file

Verify Fix Applied:

After upgrading to 2.0.0, attempt the same unauthenticated API call. It should return an authentication error or empty response.

📡 Detection & Monitoring

Log Indicators:

  • Multiple unauthenticated requests to API endpoints related to revision history
  • Access patterns showing retrieval of deleted content IDs

Network Indicators:

  • Unusual volume of GET requests to /api/revision/* endpoints from unauthenticated sources

SIEM Query:

source="apache_answer" AND (uri_path="/api/revision/*" OR uri_path="/api/history/*") AND http_status=200 AND auth_status="unauthenticated"

🔗 References

📤 Share & Export