A vulnerability of authorization bypass through user-controlled key in the 'console-survey/api/v1/answer/{EVENTID}/{TIMESTAMP}/' endpoint. Exploiting this vulnerability would allow an unauthenticated attacker to enumerate event IDs and obtain the complete Q&A history. This publicly exposed data may include IDs, private URLs, private messages, internal references, or other sensitive information that should only be exposed to authenticated users. In addition, the leaked content could be exploited to facilitate other malicious activities, such as reconnaissance for lateral movement, exploitation of related systems, or unauthorised access to internal applications referenced in the content of chat messages.
Metrics
Affected Vendors & Products
References
History
Mon, 30 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 30 Mar 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability of authorization bypass through user-controlled key in the 'console-survey/api/v1/answer/{EVENTID}/{TIMESTAMP}/' endpoint. Exploiting this vulnerability would allow an unauthenticated attacker to enumerate event IDs and obtain the complete Q&A history. This publicly exposed data may include IDs, private URLs, private messages, internal references, or other sensitive information that should only be exposed to authenticated users. In addition, the leaked content could be exploited to facilitate other malicious activities, such as reconnaissance for lateral movement, exploitation of related systems, or unauthorised access to internal applications referenced in the content of chat messages. | |
| Title | Authorization Bypass in ON24 Q&A chat | |
| First Time appeared |
On24
On24 on24 Q A Chat |
|
| Weaknesses | CWE-639 | |
| CPEs | cpe:2.3:a:on24:on24_q_a_chat:*:*:*:*:*:*:*:* | |
| Vendors & Products |
On24
On24 on24 Q A Chat |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2026-03-30T15:32:43.386Z
Reserved: 2026-02-27T10:16:13.144Z
Link: CVE-2026-3321
Updated: 2026-03-30T15:32:38.461Z
Status : Received
Published: 2026-03-30T14:16:35.420
Modified: 2026-03-30T14:16:35.420
Link: CVE-2026-3321
No data.
OpenCVE Enrichment
No data.