Cyber Posture

CVE-2026-34020

High

Published: 09 April 2026

Published
09 April 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0008 23.6th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-34020 is a high-severity Use of GET Request Method With Sensitive Query Strings (CWE-598) vulnerability in Apache Openmeetings. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Network Sniffing (T1040); ranked at the 23.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 IA-5 (Authenticator Management) and SC-8 (Transmission Confidentiality and Integrity).

Threat & Defense at a Glance

What attackers do: exploitation maps to Network Sniffing (T1040) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

IA-5 requires protecting authenticator content from unauthorized disclosure and modification, directly preventing exposure of usernames and passwords transmitted as query parameters in GET requests.

prevent

SC-8 mandates confidentiality and integrity protection for transmitted information, encrypting credentials in query strings during network transit to block interception.

prevent

SI-2 requires timely remediation of identified flaws, enabling upgrade to Apache OpenMeetings 9.0.0 that fixes the insecure GET login endpoint.

MITRE ATT&CK Enterprise TechniquesAI

T1040 Network Sniffing Credential Access
Adversaries may passively sniff network traffic to capture information about an environment, including authentication material passed over the network.
T1552.001 Credentials In Files Credential Access
Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials.
Why these techniques?

Vulnerability exposes credentials in GET query strings, directly enabling capture via network traffic interception (T1040) and extraction from log/history files (T1552.001).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Use of GET Request Method With Sensitive Query Strings vulnerability in Apache OpenMeetings. The REST login endpoint uses HTTP GET method with username and password passed as query parameters. Please check references regarding possible impact This issue affects Apache OpenMeetings:…

more

from 3.1.3 before 9.0.0. Users are recommended to upgrade to version 9.0.0, which fixes the issue.

Deeper analysisAI

CVE-2026-34020 is a Use of GET Request Method With Sensitive Query Strings vulnerability (CWE-598) in Apache OpenMeetings. The issue resides in the REST login endpoint, which transmits usernames and passwords as query parameters over HTTP GET requests. This affects Apache OpenMeetings versions from 3.1.3 up to but not including 9.0.0, with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).

An unauthenticated attacker with network access can exploit this vulnerability due to its low attack complexity and lack of required privileges or user interaction. By intercepting GET requests—such as through network traffic capture, proxy logs, browser history, or server access logs—the attacker can extract sensitive credentials from the exposed query strings, resulting in high confidentiality impact without affecting integrity or availability.

Apache advisories recommend upgrading to version 9.0.0, which resolves the issue by addressing the insecure transmission of credentials. Additional details on impact and references, including Apache mailing lists and OWASP guidance on query string exposures, are available at the provided URLs.

Details

CWE(s)

Affected Products

apache
openmeetings
3.1.3 — 9.0.0

CVEs Like This One

CVE-2026-33266Same product: Apache Openmeetings
CVE-2024-54676Same product: Apache Openmeetings
CVE-2025-52435Same vendor: Apache
CVE-2026-34487Same vendor: Apache
CVE-2026-31987Same vendor: Apache
CVE-2026-31923Same vendor: Apache
CVE-2024-55532Same vendor: Apache
CVE-2025-66524Same vendor: Apache
CVE-2026-24308Same vendor: Apache
CVE-2026-30911Same vendor: Apache

References