{"vulnerability": "CVE-2025-29868", "sightings": [{"uuid": "915b132b-787a-4662-99c9-52402797ca9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29868", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3llq3i46cmg2m", "content": "", "creation_timestamp": "2025-04-01T04:56:30.772952Z"}, {"uuid": "fbd8e03e-46c3-4797-89eb-75a4a5306731", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29868", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lmhmocwe7p2o", "content": "", "creation_timestamp": "2025-04-10T13:35:26.900771Z"}, {"uuid": "be341f8a-ffcf-44c1-b501-7fd40b872089", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29868", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lls6aodmqj2f", "content": "", "creation_timestamp": "2025-04-02T00:51:22.061761Z"}, {"uuid": "20d88e6d-11b2-4f30-bd85-fbb62e8af7d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29868", "type": "seen", "source": "https://t.me/cvedetector/21739", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29868 - Apache Answer IP Address Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-29868 \nPublished : April 1, 2025, 8:15 a.m. | 1\u00a0hour, 12\u00a0minutes ago \nDescription : Private Data Structure Returned From A Public Method vulnerability in Apache Answer.  \n  \nThis issue affects Apache Answer: through 1.4.2.  \n  \nIf a user uses an externally referenced image, when a user accesses this image, the provider of the image may obtain private information about the ip address of that accessing user.  \nUsers are recommended to upgrade to version 1.4.5, which fixes the issue.\u00a0In the new version, administrators can set whether external content can be displayed. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T11:57:26.000000Z"}, {"uuid": "2c617ed8-6a2b-4199-a8da-1186ba21c692", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29868", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9866", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29868\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Private Data Structure Returned From A Public Method vulnerability in Apache Answer.\n\nThis issue affects Apache Answer: through 1.4.2.\n\nIf a user uses an externally referenced image, when a user accesses this image, the provider of the image may obtain private information about the ip address of that accessing user.\nUsers are recommended to upgrade to version 1.4.5, which fixes the issue.\u00a0In the new version, administrators can set whether external content can be displayed.\n\ud83d\udccf Published: 2025-04-01T07:56:28.633Z\n\ud83d\udccf Modified: 2025-04-01T07:56:28.633Z\n\ud83d\udd17 References:\n1. https://lists.apache.org/thread/l7pohw5g03g3qsvrz8pqc9t29mdv5lhf", "creation_timestamp": "2025-04-01T08:32:32.000000Z"}]}