{"id":"CVE-2025-29868","details":"Private Data Structure Returned From A Public Method vulnerability in Apache Answer.\n\nThis issue affects Apache Answer: through 1.4.2.\n\nIf a user uses an externally referenced image, when a user accesses this image, the provider of the image may obtain private information about the ip address of that accessing user.\nUsers are recommended to upgrade to version 1.4.5, which fixes the issue. In the new version, administrators can set whether external content can be displayed.","aliases":["GHSA-wqcc-mfhw-53pc","GO-2025-3587"],"modified":"2026-04-10T05:24:35.916292Z","published":"2025-04-01T08:15:14.990Z","related":["openSUSE-SU-2025:14970-1"],"references":[{"type":"ADVISORY","url":"https://lists.apache.org/thread/l7pohw5g03g3qsvrz8pqc9t29mdv5lhf"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2025/04/01/2"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2025/04/02/1"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2025/04/10/3"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/incubator-answer","events":[{"introduced":"0"},{"last_affected":"0fd7e81acd869706b2eb480b0d83bf57a6d72ac7"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.4.2"}]}}],"versions":["v0.4.0","v1.0.1","v1.0.3","v1.0.4","v1.0.5","v1.0.6","v1.0.7","v1.0.8","v1.0.9","v1.1.1","v1.1.2","v1.1.3","v1.2.0","v1.2.0-RC1","v1.2.1","v1.2.1-RC1","v1.2.5","v1.2.5-RC1","v1.2.5-RC2","v1.3.0","v1.3.0-RC1","v1.3.1","v1.3.1-RC1","v1.3.1-RC2","v1.3.5","v1.3.5-RC1","v1.4.1","v1.4.1-RC1","v1.4.1-RC2","v1.4.2","v1.4.2-RC1","v1.4.2-RC2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-29868.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}]}