CVE-2026-27491
MEDIUMDiscourse has a bypass of official warnings messages by non-staff users
Title source: cnaDescription
Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, a type coercion issue in a post actions API endpoint allowed non-staff users to issue warnings to other users. Warnings are a staff-only moderation feature. The vulnerability required the attacker to be a logged-in user and to send a specifically crafted request. No data exposure or privilege escalation beyond the ability to create unauthorized user warnings was possible. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. No known workarounds are available.
Scores
CVSS v3
4.3
EPSS
0.0003
EPSS Percentile
9.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-862
Status
published
Products (5)
discourse/discourse
2026.3.0
discourse/discourse
2026.1.0 - 2026.1.2
discourse/discourse
>= 2026.1.0-latest, < 2026.1.2
discourse/discourse
>= 2026.2.0-latest, < 2026.2.1
discourse/discourse
= 2026.3.0-latest
Published
Mar 19, 2026
Tracked Since
Mar 20, 2026