Description
Discourse is the an open source discussion platform. In affected versions a maliciously crafted request for static assets could cause error responses to be cached by Discourse's default NGINX proxy configuration. A corrected NGINX configuration is included in the latest stable, beta and tests-passed versions of Discourse. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References (2)
Core 2
Core References
Third Party Advisory x_refsource_confirm
https://github.com/discourse/discourse/security/advisories/GHSA-4ff8-3j78-w6pp
Patch, Third Party Advisory x_refsource_misc
https://github.com/discourse/discourse/commit/7af25544c3940c4d046c51f4cfac9c72a06d4f50
Scores
CVSS v3
5.3
EPSS
0.0038
EPSS Percentile
59.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-404
Status
published
Products (2)
discourse/discourse
2.9.0 beta7
discourse/discourse
< 2.8.7
Published
Aug 01, 2022
Tracked Since
Feb 18, 2026