Description
Discourse is an open source platform for community discussion. Prior to version 3.1.3 of the `stable` branch and version 3.2.0.beta3 of the `beta` and `tests-passed` branches, some links can inject arbitrary HTML tags when rendered through our Onebox engine. The issue is patched in version 3.1.3 of the `stable` branch and version 3.2.0.beta3 of the `beta` and `tests-passed` branches. There are no known workarounds.
Exploits (1)
References (3)
Core 3
Core References
Vendor Advisory x_refsource_confirm
https://github.com/discourse/discourse/security/advisories/GHSA-j95w-5hvx-jp5w
Patch x_refsource_misc
https://github.com/discourse/discourse/commit/628b293ff53fb617b3464dd27268aec84388cc09
Scores
CVSS v3
5.3
EPSS
0.1344
EPSS Percentile
94.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-74
CWE-79
Status
published
Products (3)
discourse/discourse
3.2.0 beta1 (2 CPE variants)
discourse/discourse
< 3.1.3
discourse/discourse
< 3.2.0
Published
Nov 10, 2023
Tracked Since
Feb 18, 2026