The REST login endpoint uses HTTP GET method with username and password passed as query parameters. Please check references regarding possible impact
This issue affects Apache OpenMeetings: from 3.1.3 before 9.0.0.
Users are recommended to upgrade to version 9.0.0, which fixes the issue.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-gcvm-c75m-h4p4 | Apache OpenMeetings Uses GET Request Method With Sensitive Query Strings |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 10 Apr 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Fri, 10 Apr 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache openmeetings |
|
| Vendors & Products |
Apache
Apache openmeetings |
Thu, 09 Apr 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 09 Apr 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Use of GET Request Method With Sensitive Query Strings vulnerability in Apache OpenMeetings. The REST login endpoint uses HTTP GET method with username and password passed as query parameters. Please check references regarding possible impact This issue affects Apache OpenMeetings: from 3.1.3 before 9.0.0. Users are recommended to upgrade to version 9.0.0, which fixes the issue. | |
| Title | Apache OpenMeetings: Login Credentials Passed via GET Query Parameters | |
| Weaknesses | CWE-598 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2026-04-10T20:13:47.789Z
Reserved: 2026-03-25T09:32:35.406Z
Link: CVE-2026-34020
Updated: 2026-04-09T16:29:22.642Z
Status : Received
Published: 2026-04-09T16:16:27.090
Modified: 2026-04-10T21:16:24.290
Link: CVE-2026-34020
No data.
OpenCVE Enrichment
Updated: 2026-04-10T09:32:22Z
Github GHSA