Description
The WP Discourse plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.5.9. This is due to the plugin unconditionally sending Discourse API credentials (Api-Key and Api-Username headers) to any host specified in a post's discourse_permalink custom field during comment synchronization. This makes it possible for authenticated attackers, with author-level access and above, to exfiltrate sensitive Discourse API credentials to attacker-controlled servers, as well as query internal services and potentially perform further attacks.
Published: 2025-11-01
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Exposure
Action: Assess Impact
AI Analysis

Impact

The WP Discourse plugin has a flaw that causes it to transmit Discourse API credentials unconditionally to any host listed in a post’s discourse_permalink custom field when synchronizing comments. Authenticated users with author‑level access can exploit this to send the secret Api‑Key and Api‑Username headers to attacker‑controlled servers. By exposing these credentials, an attacker gains the ability to authenticate with the Discourse forum, read or modify content, and possibly query internal services, representing a clear confidentiality and integrity violation.

Affected Systems

The affected system is any WordPress instance that runs the WP Discourse plugin version 2.5.9 or earlier supplied by the scossar vendor. This encompasses all installations of the plugin, regardless of the underlying WordPress version, with no other plugins implicated by the current CNA data.

Risk and Exploitability

The CVSS score of 4.3 marks this as a medium‑level information‑disclosure weakness that requires authenticated access. The EPSS score of less than 1% indicates that exploitation is unlikely at present, and the vulnerability is not listed in CISA’s KEV catalog. Nevertheless, the flaw allows an attacker to exfiltrate API credentials to arbitrary hosts and use those credentials for further internal attacks, which could provide full control over the associated Discourse forum and compromise user privacy. The attack can be carried out by a user with author‑level privileges who modifies a post’s discourse_permalink field and triggers comment synchronization, after which the credentials are sent to the specified host.

Generated by OpenCVE AI on April 22, 2026 at 12:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the WP Discourse plugin to the latest version (any release newer than 2.5.9 that removes the unconditional credential transmission behavior.
  • Remove or sanitize the discourse_permalink custom field from existing posts to eliminate the possibility of sending credentials to arbitrary hosts.
  • Restrict outbound traffic from the WordPress server to approved Discourse endpoints using firewall or proxy rules, preventing unauthorized credential exfiltration.

Generated by OpenCVE AI on April 22, 2026 at 12:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 03 Nov 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 03 Nov 2025 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Scossar
Scossar wp Discourse
Wordpress
Wordpress wordpress
Vendors & Products Scossar
Scossar wp Discourse
Wordpress
Wordpress wordpress

Sat, 01 Nov 2025 05:45:00 +0000

Type Values Removed Values Added
Description The WP Discourse plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.5.9. This is due to the plugin unconditionally sending Discourse API credentials (Api-Key and Api-Username headers) to any host specified in a post's discourse_permalink custom field during comment synchronization. This makes it possible for authenticated attackers, with author-level access and above, to exfiltrate sensitive Discourse API credentials to attacker-controlled servers, as well as query internal services and potentially perform further attacks.
Title WP Discourse <= 2.5.9 - Authenticated (Author+) Information Exposure
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Scossar Wp Discourse
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:58:56.374Z

Reserved: 2025-10-20T18:28:48.760Z

Link: CVE-2025-11983

cve-icon Vulnrichment

Updated: 2025-11-03T13:10:41.800Z

cve-icon NVD

Status : Deferred

Published: 2025-11-01T06:15:39.970

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-11983

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T12:15:16Z

Weaknesses