๐Ÿ” CVE Alert

CVE-2026-32607

UNKNOWN 0.0

Discourse: Stored XSS via unescaped assignee name

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, when the hidden prioritize_full_name_in_ux site setting is enabled (defaults to false, requires console access to change), user and group display names are rendered without HTML escaping in several assignment-related UI paths. This allows users with assign permission to inject arbitrary HTML/JavaScript that executes in the browser of any user viewing an affected topic. This issue has been patched in versions 2026.1.3, 2026.2.2, and 2026.3.0.

CWE CWE-79
Vendor discourse
Product discourse
Published Mar 31, 2026
Last Updated Apr 1, 2026
Stay Ahead of the Next One

Get instant alerts for discourse discourse

Be the first to know when new unknown vulnerabilities affecting discourse discourse are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

discourse / discourse
>= 2026.1.0-latest, < 2026.1.3 >= 2026.2.0-latest, < 2026.2.2 >= 2026.3.0-latest, < 2026.3.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/discourse/discourse/security/advisories/GHSA-xg68-q7ff-6gqm github.com: https://github.com/discourse/discourse/commit/46edb174e237c6e57bda9c494160da0a174fe70d