CVE-2026-27154
Discourse has XSS when editing a malicious post
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
Discourse is an open source discussion platform. Prior to versions 2025.12.2, 2026.1.1, and 2026.2.0, a user full name can be evaluated as raw HTML when the following settings are set: `display_name_on_posts` => true; and `prioritize_username_in_ux` => false. Editing a post of a malicious user would trigger an XSS. Versions 2025.12.2, 2026.1.1, and 2026.2.0 patch the issue. No known workarounds are available.
| CWE | CWE-79 |
| Vendor | discourse |
| Product | discourse |
| Published | Feb 26, 2026 |
| Last Updated | Mar 2, 2026 |
Stay Ahead of the Next One
Get instant alerts for discourse discourse
Be the first to know when new unknown vulnerabilities affecting discourse discourse are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
discourse / discourse
< 2025.12.2 >= 2026.1.0-latest, < 2026.1.1 >= 2026.2.0-latest, < 2026.2.0