140 results (0.027 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

04 Feb 2025 — Discourse is an open source platform for community discussion. In affected versions with some combinations of plugins, and with CSP disabled, activity streams in the user's profile page may be vulnerable to XSS. This has been patched in the latest version of Discourse core. Users are advised to upgrade. Users unable to upgrade should ensure CSP is enabled. • https://github.com/discourse/discourse/security/advisories/GHSA-hw4j-4hg7-22h2 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

04 Feb 2025 — Discourse is an open source platform for community discussion. In affected versions the endpoint for generating inline oneboxes for URLs wasn't enforcing limits on the number of URLs that it accepted, allowing a malicious user to inflict denial of service on some parts of the app. This vulnerability is only exploitable by authenticated users. This issue has been patched in the latest stable, beta and tests-passed versions of Discourse. Users are advised to upgrade. • https://github.com/discourse/discourse/commit/416ec83ae57924d721e6e374f4cda78bd77a4599 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

04 Feb 2025 — Discourse is an open source platform for community discussion. In affected versions users who disable chat in preferences could still be reachable in some cases. This problem has been patched in the latest version of Discourse. Users are advised to upgrade. Users unable to upgrade should disable the chat plugin within site settings. • https://github.com/discourse/discourse/security/advisories/GHSA-mrpw-gwj7-98r6 • CWE-281: Improper Preservation of Permissions •

CVSS: 8.5EPSS: 0%CPEs: 1EXPL: 0

04 Feb 2025 — Discourse is an open source platform for community discussion. In affected versions an attacker can make craft an XHR request to poison the anonymous cache (for example, the cache may have a response with missing preloaded data). This issue only affects anonymous visitors of the site. This problem has been patched in the latest version of Discourse. Users are advised to upgrade. • https://github.com/discourse/discourse/security/advisories/GHSA-2352-252q-qc82 • CWE-346: Origin Validation Error •

CVSS: 2.2EPSS: 0%CPEs: 1EXPL: 0

04 Feb 2025 — Discourse is an open source platform for community discussion. PM titles and metadata can be read by other users when the "PM tags allowed for groups" option is enabled, the other user is a member of a group added to this option, and the PM has been tagged. This issue has been patched in the latest `stable`, `beta` and `tests-passed` versions of Discourse. Users are advised to upgrade. Users unable to upgrade should remove all groups from the the "PM tags allowed for groups" option. • https://github.com/discourse/discourse/security/advisories/GHSA-xmgr-g9cp-v239 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

04 Feb 2025 — Discourse is an open source platform for community discussion. An attacker can execute arbitrary JavaScript on users' browsers by posting a maliciously crafted onebox url. This issue only affects sites with CSP disabled. This problem has been patched in the latest version of Discourse. Users are advised to upgrade. • https://github.com/discourse/discourse/security/advisories/GHSA-j855-mhxj-x6vg • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

04 Feb 2025 — Discourse is an open source platform for community discussion. In affected versions an attacker can execute arbitrary JavaScript on users' browsers by posting a malicious video placeholder html element. This issue only affects sites with CSP disabled. This problem has been patched in the latest version of Discourse. Users are advised to upgrade. • https://github.com/discourse/discourse/security/advisories/GHSA-jcjx-694p-c5m3 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.5EPSS: 0%CPEs: 1EXPL: 0

04 Feb 2025 — Discourse is an open source platform for community discussion. In affected versions an attacker can carefully craft a request with the right request headers to poison the anonymous cache (for example, the cache may have a response with missing preloaded data). This issue only affects anonymous visitors of the site. This problem has been patched in the latest version of Discourse. Users are advised to upgrade. • https://github.com/discourse/discourse/security/advisories/GHSA-5h4h-2f46-r3c7 • CWE-346: Origin Validation Error •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

19 Dec 2024 — Discourse is an open source platform for community discussion. Sites that are using discourse connect but still have local logins enabled could allow attackers to bypass discourse connect to create accounts and login. This problem is patched in the latest version of Discourse. Users unable to upgrade who are using discourse connect may disable all other login methods as a workaround. • https://github.com/discourse/discourse/security/advisories/GHSA-v8rf-pvgm-xxf2 • CWE-359: Exposure of Private Personal Information to an Unauthorized Actor •

CVSS: 2.2EPSS: 0%CPEs: 1EXPL: 0

19 Dec 2024 — Discourse is an open source platform for community discussion. Moderators can see the Screened emails list in the admin dashboard, and through that can learn the email of a user. This problem is patched in the latest version of Discourse. Users unable to upgrade should remove moderator role from untrusted users. • https://github.com/discourse/discourse/security/advisories/GHSA-cqw6-rr3v-8fff • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •