๐Ÿ” CVE Alert

CVE-2026-32113

UNKNOWN 0.0

Discourse: Open redirect via `sso_destination_url` cookie in `enter`

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, the enter action in StaticController reads the sso_destination_url cookie and redirects to it with allow_other_host: true without validating the destination URL. While this cookie is normally set during legitimate DiscourseConnect Provider flows with cryptographically validated SSO payloads, cookies are client-controlled and can be set by attackers. This issue has been patched in versions 2026.1.3, 2026.2.2, and 2026.3.0.

CWE CWE-601
Vendor discourse
Product discourse
Published Mar 31, 2026
Last Updated Apr 1, 2026
Stay Ahead of the Next One

Get instant alerts for discourse discourse

Be the first to know when new unknown vulnerabilities affecting discourse discourse are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

discourse / discourse
>= 2026.1.0-latest, < 2026.1.3 >= 2026.2.0-latest, < 2026.2.2 >= 2026.3.0-latest, < 2026.3.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/discourse/discourse/security/advisories/GHSA-378j-ccw4-4fwh github.com: https://github.com/discourse/discourse/commit/080408b93d00305b51d71f63f755f43fa601884d meta.discourse.org: https://meta.discourse.org/t/using-discourse-as-a-sso-provider/32974 meta.discourse.org: https://meta.discourse.org/t/use-discourse-as-an-identity-provider-sso-discourseconnect/32974