A vulnerability of authorization bypass through user-controlled key in the 'console-survey/api/v1/answer/{EVENTID}/{TIMESTAMP}/' endpoint. Exploiting this vulnerability would allow an unauthenticated attacker to enumerate event IDs and obtain the complete Q&A history. This publicly exposed data may include IDs, private URLs, private messages, internal references, or other sensitive information that should only be exposed to authenticated users. In addition, the leaked content could be exploited to facilitate other malicious activities, such as reconnaissance for lateral movement, exploitation of related systems, or unauthorised access to internal applications referenced in the content of chat messages.

Project Subscriptions

Vendors Products
On24 Q A Chat Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 30 Mar 2026 13:45:00 +0000

Type Values Removed Values Added
Description A vulnerability of authorization bypass through user-controlled key in the 'console-survey/api/v1/answer/{EVENTID}/{TIMESTAMP}/' endpoint. Exploiting this vulnerability would allow an unauthenticated attacker to enumerate event IDs and obtain the complete Q&A history. This publicly exposed data may include IDs, private URLs, private messages, internal references, or other sensitive information that should only be exposed to authenticated users. In addition, the leaked content could be exploited to facilitate other malicious activities, such as reconnaissance for lateral movement, exploitation of related systems, or unauthorised access to internal applications referenced in the content of chat messages.
Title Authorization Bypass in ON24 Q&A chat
First Time appeared On24
On24 on24 Q A Chat
Weaknesses CWE-639
CPEs cpe:2.3:a:on24:on24_q_a_chat:*:*:*:*:*:*:*:*
Vendors & Products On24
On24 on24 Q A Chat
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published:

Updated: 2026-03-30T15:32:43.386Z

Reserved: 2026-02-27T10:16:13.144Z

Link: CVE-2026-3321

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-30T14:16:35.420

Modified: 2026-03-30T14:16:35.420

Link: CVE-2026-3321

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses