CVE-2026-32113
Discourse: Open redirect via `sso_destination_url` cookie in `enter`
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, the enter action in StaticController reads the sso_destination_url cookie and redirects to it with allow_other_host: true without validating the destination URL. While this cookie is normally set during legitimate DiscourseConnect Provider flows with cryptographically validated SSO payloads, cookies are client-controlled and can be set by attackers. This issue has been patched in versions 2026.1.3, 2026.2.2, and 2026.3.0.
| CWE | CWE-601 |
| Vendor | discourse |
| Product | discourse |
| Published | Mar 31, 2026 |
| Last Updated | Apr 1, 2026 |
Stay Ahead of the Next One
Get instant alerts for discourse discourse
Be the first to know when new unknown vulnerabilities affecting discourse discourse are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
discourse / discourse
>= 2026.1.0-latest, < 2026.1.3 >= 2026.2.0-latest, < 2026.2.2 >= 2026.3.0-latest, < 2026.3.0
References
github.com: https://github.com/discourse/discourse/security/advisories/GHSA-378j-ccw4-4fwh github.com: https://github.com/discourse/discourse/commit/080408b93d00305b51d71f63f755f43fa601884d meta.discourse.org: https://meta.discourse.org/t/using-discourse-as-a-sso-provider/32974 meta.discourse.org: https://meta.discourse.org/t/use-discourse-as-an-identity-provider-sso-discourseconnect/32974