| Type | software | 
| Product Environment | web | 
| Product Name | Apache Answer | 
| Product Vendor | Apache Software Foundation | 
| Product Version | 1.4.1 | 
| Product Link | https://answer.apache.org/ | 
| Vulnerability Name | Externally referenced images can leak user privacy | 
| Severity | Medium | 
| CVSS String | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N | 
| CVSS Score | 5.7 | 
| CVE ID | CVE-2025-29868 | 
| Vendor Acknowledgement | Yes | 
| Affected digital Assets | 1 | 
| Affected Users | 1000 | 
| Date of Reporting | Feb 02, 2025 | 
| PoC Exploit | - | 
| Credit | 0xhamy,daeda1us | 
Apache Answer Q&A v1.4.1 is vulnerable to stored external resource loading via Markdown image embedding, enabling passive privacy data exfiltration from viewers’ browsers.
When a comment includes a Markdown image referencing an attacker-controlled URL, the browser (client) loads that external resource whenever the post or comment thread is viewed, disclosing the viewer’s IP address and User-Agent/OS to the attacker.
Severity / CVSS (our assessment): CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N → 5.7 (Medium)
Vendor-assigned: 6.5 (Medium)
 in comments and posts.alt text, tiny/failed image rendering inside compact comment UI), ensuring stealthy tracking.Open a question where you can comment.
Navigate to:
/questions/10010000000000002
Post a comment with a Markdown image pointing to a controlled endpoint.
Example payload:

(You may also use a public collector such as https://webhook.site/<your-id>).
View the question (or expand the comments).
When any user loads the page, their browser performs a GET request to the specified URL.
Observe captured viewer metadata.
On the attacker server, record incoming requests and inspect:
img-src to arbitrary origins in UGC surfaces (e.g., img-src 'self' data:) or isolates UGC in a sandboxed origin.