Apache OpenMeetings Uses Hard-coded Cryptographic Key
High severity
GitHub Reviewed
Published
Apr 9, 2026
to the GitHub Advisory Database
•
Updated Apr 10, 2026
Package
Affected versions
>= 6.1.0, < 9.0.0
Patched versions
9.0.0
Description
Published by the National Vulnerability Database
Apr 9, 2026
Published to the GitHub Advisory Database
Apr 9, 2026
Reviewed
Apr 10, 2026
Last updated
Apr 10, 2026
Use of Hard-coded Cryptographic Key vulnerability in Apache OpenMeetings.
The remember-me cookie encryption key is set to default value in openmeetings.properties and not being auto-rotated. In case OM admin hasn't changed the default encryption key, an attacker who has stolen a cookie from a logged-in user can get full user credentials.
This issue affects Apache OpenMeetings: from 6.1.0 before 9.0.0.
Users are recommended to upgrade to version 9.0.0, which fixes the issue.
References