๐Ÿ” CVE Alert

CVE-2026-27491

UNKNOWN 0.0

Discourse has a bypass of official warnings messages by non-staff users

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
11th

Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, a type coercion issue in a post actions API endpoint allowed non-staff users to issue warnings to other users. Warnings are a staff-only moderation feature. The vulnerability required the attacker to be a logged-in user and to send a specifically crafted request. No data exposure or privilege escalation beyond the ability to create unauthorized user warnings was possible. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. No known workarounds are available.

CWE CWE-862
Vendor discourse
Product discourse
Published Mar 19, 2026
Last Updated Mar 20, 2026
Stay Ahead of the Next One

Get instant alerts for discourse discourse

Be the first to know when new unknown vulnerabilities affecting discourse discourse are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

discourse / discourse
>= 2026.1.0-latest, < 2026.1.2 >= 2026.2.0-latest, < 2026.2.1 = 2026.3.0-latest

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/discourse/discourse/security/advisories/GHSA-xq37-5fvf-4m4j github.com: https://github.com/discourse/discourse/commit/60a588f4da4ab0feceb2c44787d4261b4f8757be github.com: https://github.com/discourse/discourse/commit/d3cb203feabc46d765ecb91f348613a2bd531b89 github.com: https://github.com/discourse/discourse/commit/f5fef73827da7520efc517357bd2a6bab35d7886