
CVE-2025-23023 – Anonymous cache poisoning via request headers in Discourse
https://notcve.org/view.php?id=CVE-2025-23023
04 Feb 2025 — Discourse is an open source platform for community discussion. In affected versions an attacker can carefully craft a request with the right request headers to poison the anonymous cache (for example, the cache may have a response with missing preloaded data). This issue only affects anonymous visitors of the site. This problem has been patched in the latest version of Discourse. Users are advised to upgrade. • https://github.com/discourse/discourse/security/advisories/GHSA-5h4h-2f46-r3c7 • CWE-346: Origin Validation Error •

CVE-2024-54142 – Cross-site Scripting via Discourse-ai SharedAiConversation onebox in Discourse
https://notcve.org/view.php?id=CVE-2024-54142
14 Jan 2025 — Discourse AI is a Discourse plugin which provides a number of AI features. When sharing Discourse AI Bot conversations into posts, if the conversation had HTML entities those could leak into the Discourse application when a user visited a post with a onebox to said conversation. This issue has been addressed in commit `92f122c`. Users are advised to update. Users unable to update may remove all groups from `ai bot public sharing allowed groups` site setting. • https://github.com/discourse/discourse-ai/commit/92f122c54d9d7ead9223a056270bff5b4c42c73f • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2024-49765 – Bypass of Discourse Connect using other login paths if enabled in Discourse
https://notcve.org/view.php?id=CVE-2024-49765
19 Dec 2024 — Discourse is an open source platform for community discussion. Sites that are using discourse connect but still have local logins enabled could allow attackers to bypass discourse connect to create accounts and login. This problem is patched in the latest version of Discourse. Users unable to upgrade who are using discourse connect may disable all other login methods as a workaround. • https://github.com/discourse/discourse/security/advisories/GHSA-v8rf-pvgm-xxf2 • CWE-359: Exposure of Private Personal Information to an Unauthorized Actor •

CVE-2024-52589 – Moderators can view Screened emails even when the “moderators view emails” option is disabled in Discourse
https://notcve.org/view.php?id=CVE-2024-52589
19 Dec 2024 — Discourse is an open source platform for community discussion. Moderators can see the Screened emails list in the admin dashboard, and through that can learn the email of a user. This problem is patched in the latest version of Discourse. Users unable to upgrade should remove moderator role from untrusted users. • https://github.com/discourse/discourse/security/advisories/GHSA-cqw6-rr3v-8fff • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2024-52794 – Magnific lightbox susceptible to Cross-site Scripting in Discourse
https://notcve.org/view.php?id=CVE-2024-52794
19 Dec 2024 — Discourse is an open source platform for community discussion. Users clicking on the lightbox thumbnails could be affected. This problem is patched in the latest version of Discourse. Users are advised to upgrade. There are no known workarounds for this vulnerability. • https://github.com/discourse/discourse/security/advisories/GHSA-m3v4-v2rp-hfm9 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2024-53991 – Potential Backup file leaked via Nginx in Discourse
https://notcve.org/view.php?id=CVE-2024-53991
19 Dec 2024 — Discourse is an open source platform for community discussion. This vulnerability only impacts Discourse instances configured to use `FileStore::LocalStore` which means uploads and backups are stored locally on disk. If an attacker knows the name of the Discourse backup file, the attacker can trick nginx into sending the Discourse backup file with a well crafted request. This issue is patched in the latest stable, beta and tests-passed versions of Discourse. Users are advised to upgrade. • https://github.com/discourse/discourse/security/advisories/GHSA-567m-82f6-56rv • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2024-47773 – Anonymous cache poisoning via XHR requests in Discourse
https://notcve.org/view.php?id=CVE-2024-47773
08 Oct 2024 — Discourse is an open source platform for community discussion. An attacker can make several XHR requests until the cache is poisoned with a response without any preloaded data. This issue only affects anonymous visitors of the site. This problem has been patched in the latest version of Discourse. Users are advised to upgrade. • https://github.com/discourse/discourse/security/advisories/GHSA-58vv-9j8h-hw2v • CWE-610: Externally Controlled Reference to a Resource in Another Sphere •

CVE-2024-47772 – Cross-site Scripting (XSS) via chat excerpts when content security policy (CSP) disabled in Discourse
https://notcve.org/view.php?id=CVE-2024-47772
07 Oct 2024 — Discourse is an open source platform for community discussion. An attacker can execute arbitrary JavaScript on users' browsers by sending a maliciously crafted chat message and replying to it. This issue only affects sites with CSP disabled. This problem is patched in the latest version of Discourse. All users are advised to upgrade. • https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2024-43789 – Denial of service by the absence of restrictions on replies to posts in Discourse
https://notcve.org/view.php?id=CVE-2024-43789
07 Oct 2024 — Discourse is an open source platform for community discussion. A user can create a post with many replies, and then attempt to fetch them all at once. This can potentially reduce the availability of a Discourse instance. This problem has been patched in the latest version of Discourse. All users area are advised to upgrade. • https://github.com/discourse/discourse/security/advisories/GHSA-62cq-cpmc-hvqq • CWE-400: Uncontrolled Resource Consumption •

CVE-2024-45297 – Prevent topic list filtering by hidden tags for unauthorized users in Discourse
https://notcve.org/view.php?id=CVE-2024-45297
07 Oct 2024 — Discourse is an open source platform for community discussion. Users can see topics with a hidden tag if they know the label/name of that tag. This issue has been patched in the latest stable, beta and tests-passed version of Discourse. All users area are advised to upgrade. There are no known workarounds for this vulnerability. • https://github.com/discourse/discourse/security/advisories/GHSA-58xw-3qr3-53gp • CWE-269: Improper Privilege Management •