Description
Discourse is an open source discussion platform. Prior to version 3.1.0.beta7 of the `beta` and `tests-passed` branches, a CSP (Content Security Policy) nonce reuse vulnerability was discovered could allow cross-site scripting (XSS) attacks to bypass CSP protection for anonymous (i.e. unauthenticated) users. There are no known XSS vectors at the moment, but should one be discovered, this vulnerability would allow the XSS attack to bypass CSP and execute successfully. This vulnerability isn't applicable to logged-in users. Version 3.1.0.beta7 contains a patch. The stable branch doesn't have this vulnerability. A workaround to prevent the vulnerability is to disable Google Tag Manager, i.e., unset the `gtm container id` setting.
Exploits (1)
References (2)
Core 2
Core References
Vendor Advisory x_refsource_confirm
https://github.com/discourse/discourse/security/advisories/GHSA-gr5h-hm62-jr3j
Patch x_refsource_misc
https://github.com/discourse/discourse/commit/0976c8fad6970b6182e7837bf87de07709407f25
Scores
CVSS v3
6.8
EPSS
0.0019
EPSS Percentile
40.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-323
CWE-79
Status
published
Products (5)
discourse/discourse
1.1.0 beta1 (9 CPE variants)
discourse/discourse
1.2.0 beta1 (9 CPE variants)
discourse/discourse
1.3.0 beta1 (11 CPE variants)
discourse/discourse
1.4.0 beta1 (12 CPE variants)
discourse/discourse
1.5.0 beta1 (9 CPE variants)
Published
Jul 28, 2023
Tracked Since
Feb 18, 2026