Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3321: CWE-639 Authorization bypass through User-Controlled key in ON24 ON24 Q&A chat

0
High
VulnerabilityCVE-2026-3321cvecve-2026-3321cwe-639
Published: Mon Mar 30 2026 (03/30/2026, 13:17:51 UTC)
Source: CVE Database V5
Vendor/Project: ON24
Product: ON24 Q&A chat

Description

A vulnerability of authorization bypass through user-controlled key in the 'console-survey/api/v1/answer/{EVENTID}/{TIMESTAMP}/' endpoint. Exploiting this vulnerability would allow an unauthenticated attacker to enumerate event IDs and obtain the complete Q&A history. This publicly exposed data may include IDs, private URLs, private messages, internal references, or other sensitive information that should only be exposed to authenticated users. In addition, the leaked content could be exploited to facilitate other malicious activities, such as reconnaissance for lateral movement, exploitation of related systems, or unauthorised access to internal applications referenced in the content of chat messages.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 13:53:26 UTC

Technical Analysis

CVE-2026-3321 is an authorization bypass vulnerability classified under CWE-639, affecting the ON24 Q&A chat product. The flaw exists in the 'console-survey/api/v1/answer/{EVENTID}/{TIMESTAMP}/' REST API endpoint, which improperly authorizes requests based on user-controlled keys. Attackers can enumerate valid EVENTID values and retrieve the entire Q&A history without authentication. This unauthorized access exposes sensitive information including event IDs, private URLs, private messages, and internal references that should be restricted to authenticated users only. The vulnerability arises from insufficient access control checks on the API endpoint, allowing attackers to bypass authorization mechanisms. The exposed data can be used for reconnaissance, facilitating lateral movement within the victim’s network or unauthorized access to internal applications referenced in the chat content. The CVSS 4.0 base score is 8.7, reflecting network attack vector, low attack complexity, no privileges or user interaction required, and high confidentiality impact. The vulnerability is publicly disclosed with no known exploits in the wild yet, but the risk remains high due to the sensitivity of the data exposed and the ease of exploitation. No patches or mitigation links are currently provided by the vendor, emphasizing the need for immediate defensive measures.

Potential Impact

The impact of CVE-2026-3321 is significant for organizations using ON24 Q&A chat, especially those handling sensitive or confidential information during events. Unauthorized access to Q&A histories can lead to data breaches exposing private communications, internal URLs, and references to internal systems. This exposure can facilitate further attacks such as lateral movement within corporate networks, targeted phishing, or exploitation of referenced internal applications. The breach of confidentiality can damage organizational reputation, lead to regulatory compliance violations, and cause financial losses. Since the vulnerability requires no authentication and can be exploited remotely, the attack surface is broad, increasing the likelihood of exploitation. Organizations relying on ON24 for webinars, virtual events, or customer engagement are particularly at risk, as attackers can harvest sensitive event data without detection. The lack of known exploits in the wild currently reduces immediate risk but does not diminish the potential for future attacks.

Mitigation Recommendations

To mitigate CVE-2026-3321, organizations should first monitor for any updates or patches released by ON24 and apply them promptly once available. In the absence of official patches, implement network-level controls such as restricting access to the vulnerable API endpoint using firewall rules or API gateways to allow only trusted IP addresses or authenticated users. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious enumeration patterns targeting the 'console-survey/api/v1/answer/' endpoint. Conduct thorough logging and monitoring of API access to detect anomalous requests indicative of exploitation attempts. Review and harden access control policies within ON24 configurations to ensure minimal exposure of sensitive data. Additionally, consider isolating the ON24 environment from critical internal systems to limit lateral movement opportunities if a breach occurs. Educate event administrators and security teams about the vulnerability and encourage vigilance for unusual activity. Finally, perform regular security assessments and penetration tests focusing on API endpoints to identify similar authorization weaknesses.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
INCIBE
Date Reserved
2026-02-27T10:16:13.144Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ca7cd8e6bfc5ba1d314847

Added to database: 3/30/2026, 1:38:32 PM

Last enriched: 3/30/2026, 1:53:26 PM

Last updated: 3/30/2026, 4:46:58 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses