| Type | software |
| Product Environment | web |
| Product Name | Apache Answer |
| Product Vendor | Apache Software Foundation |
| Product Version | 1.4.1 |
| Product Link | https://answer.apache.org/ |
| Vulnerability Name | Externally referenced images can leak user privacy |
| Severity | Medium |
|
CVSS String
|
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N |
| CVSS Score | 5.7 |
| CVE ID | CVE-2025-29868 |
| Vendor Acknowledgement | Yes |
|
Affected digital Assets
|
1 |
|
Affected Users
|
1000 |
| Date of Reporting | Feb 02, 2025 |
| PoC Exploit | - |
| Credit | 0xhamy,daeda1us |
Apache Answer Q&A v1.4.1 is vulnerable to stored external resource loading via Markdown image embedding, enabling passive privacy data exfiltration from viewers’ browsers.
When a comment includes a Markdown image referencing an attacker-controlled URL, the browser (client) loads that external resource whenever the post or comment thread is viewed, disclosing the viewer’s IP address and User-Agent/OS to the attacker.
Severity / CVSS (our assessment): CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N → 5.7 (Medium)
Vendor-assigned: 6.5 (Medium)
 in comments and posts.alt text, tiny/failed image rendering inside compact comment UI), ensuring stealthy tracking.Open a question where you can comment.
Navigate to:
/questions/10010000000000002
Post a comment with a Markdown image pointing to a controlled endpoint.
Example payload:

(You may also use a public collector such as https://webhook.site/<your-id>).
View the question (or expand the comments).
When any user loads the page, their browser performs a GET request to the specified URL.
Observe captured viewer metadata.
On the attacker server, record incoming requests and inspect:
img-src to arbitrary origins in UGC surfaces (e.g., img-src 'self' data:) or isolates UGC in a sandboxed origin.