If an open source web application is publishing the version via a public, non-access controlled API/Header, is it considered a security issue?
The premise of the question is that, if a particular version had a vulnerability which was fixed in a later release, attackers could target the vulnerable version if it is public.
This is similar to other web servers (like nginx, express) etc setting a header like X-Powered-By: Express/1.0
.