CVE-2026-27491
Discourse has a bypass of official warnings messages by non-staff users
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
11th
Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, a type coercion issue in a post actions API endpoint allowed non-staff users to issue warnings to other users. Warnings are a staff-only moderation feature. The vulnerability required the attacker to be a logged-in user and to send a specifically crafted request. No data exposure or privilege escalation beyond the ability to create unauthorized user warnings was possible. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. No known workarounds are available.
| CWE | CWE-862 |
| Vendor | discourse |
| Product | discourse |
| Published | Mar 19, 2026 |
| Last Updated | Mar 20, 2026 |
Stay Ahead of the Next One
Get instant alerts for discourse discourse
Be the first to know when new unknown vulnerabilities affecting discourse discourse are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
discourse / discourse
>= 2026.1.0-latest, < 2026.1.2 >= 2026.2.0-latest, < 2026.2.1 = 2026.3.0-latest
References
github.com: https://github.com/discourse/discourse/security/advisories/GHSA-xq37-5fvf-4m4j github.com: https://github.com/discourse/discourse/commit/60a588f4da4ab0feceb2c44787d4261b4f8757be github.com: https://github.com/discourse/discourse/commit/d3cb203feabc46d765ecb91f348613a2bd531b89 github.com: https://github.com/discourse/discourse/commit/f5fef73827da7520efc517357bd2a6bab35d7886