A vulnerability of authorization bypass through user-controlled key in the 'console-survey/api/v1/answer/{EVENTID}/{TIMESTAMP}/' endpoint. Exploiting this vulnerability would allow an unauthenticated attacker to enumerate event IDs and obtain the complete Q&A history. This publicly exposed data may include IDs, private URLs, private messages, internal references, or other sensitive information that should only be exposed to authenticated users. In addition, the leaked content could be exploited to facilitate other malicious activities, such as reconnaissance for lateral movement, exploitation of related systems, or unauthorised access to internal applications referenced in the content of chat messages.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 30 Mar 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability of authorization bypass through user-controlled key in the 'console-survey/api/v1/answer/{EVENTID}/{TIMESTAMP}/' endpoint. Exploiting this vulnerability would allow an unauthenticated attacker to enumerate event IDs and obtain the complete Q&A history. This publicly exposed data may include IDs, private URLs, private messages, internal references, or other sensitive information that should only be exposed to authenticated users. In addition, the leaked content could be exploited to facilitate other malicious activities, such as reconnaissance for lateral movement, exploitation of related systems, or unauthorised access to internal applications referenced in the content of chat messages. | |
| Title | Authorization Bypass in ON24 Q&A chat | |
| First Time appeared |
On24
On24 on24 Q A Chat |
|
| Weaknesses | CWE-639 | |
| CPEs | cpe:2.3:a:on24:on24_q_a_chat:*:*:*:*:*:*:*:* | |
| Vendors & Products |
On24
On24 on24 Q A Chat |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2026-03-30T13:17:51.425Z
Reserved: 2026-02-27T10:16:13.144Z
Link: CVE-2026-3321
No data.
Status : Received
Published: 2026-03-30T14:16:35.420
Modified: 2026-03-30T14:16:35.420
Link: CVE-2026-3321
No data.
OpenCVE Enrichment
No data.
Weaknesses