Description
Discourse is an open-source discussion platform. Prior to version 3.0.1 of the `stable` branch and version 3.1.0.beta2 of the `beta` and `tests-passed` branches, a maliciously crafted URL can be included in a user's full name field to to carry out cross-site scripting attacks on sites with a disabled or overly permissive CSP (Content Security Policy). Discourse's default CSP prevents this vulnerability. The vulnerability is patched in version 3.0.1 of the `stable` branch and version 3.1.0.beta2 of the `beta` and `tests-passed` branches. As a workaround, enable and/or restore your site's CSP to the default one provided with Discourse.
References (5)
Core 5
Core References
Vendor Advisory x_refsource_confirm
https://github.com/discourse/discourse/security/advisories/GHSA-7pm2-prxw-wrvp
Patch x_refsource_misc
https://github.com/discourse/discourse/pull/20008
Patch x_refsource_misc
https://github.com/discourse/discourse/pull/20009
Patch x_refsource_misc
https://github.com/discourse/discourse/commit/1a5a6f66cb821ed29a737311d6fdc2eba5adc915
Patch x_refsource_misc
https://github.com/discourse/discourse/commit/c186a46910431020e8efc425dec2133e7a99fa9a
Scores
CVSS v3
4.4
EPSS
0.0077
EPSS Percentile
73.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
Status
published
Products (3)
discourse/discourse
3.1.0 beta1
discourse/discourse
< 3.0.1
discourse/discourse
< 3.1.0
Published
Mar 17, 2023
Tracked Since
Feb 18, 2026