Description
Discourse is an open source discussion platform. In versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0, permalinks pointing to access-restricted resources (private topics, categories, posts, or hidden tags) were redirecting users to URLs containing the resource slug, even when the user didn't have access to view the resource. This leaked potentially sensitive information (e.g., private topic titles) via the redirect Location header and the 404 page's search box. This issue is patched in versions 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0. No known workarounds are available.
Published: 2026-01-28
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Apply Patch
AI Analysis

Impact

Permalinks that target access‑restricted resources in Discourse redirect users to URLs containing the resource slug, even when the user lacks permission. The redirect Location header and the 404 page’s search box expose potentially sensitive information such as private topic titles or tags. The flaw is an information‑disclosure vulnerability (CWE‑200).

Affected Systems

Discourse, the open‑source discussion platform, is vulnerable in releases before 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0; any instance running those versions is impacted.

Risk and Exploitability

The CVSS score of 6.9 indicates medium severity, while the EPSS score of less than 1% means exploitation is unlikely at present. The vulnerability is not listed in CISA’s KEV catalog. An attacker can craft a permalink or observe a legitimate link and trigger a redirect that exposes the slug, revealing sensitive identifiers to unauthenticated or unauthorized users. The attack vector is web‑based, requiring only the ability to access the permalink URL.

Generated by OpenCVE AI on April 18, 2026 at 01:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Discourse to a patched release (3.5.4, 2025.11.2, 2025.12.1, 2026.1.0 or later).
  • Configure the system to enforce strict authorization checks on permalink generation so that only users with access receive the resource slug.
  • Modify redirect handling so that requests for restricted resources that lack the proper permissions result in a 403 or 404 response without revealing slugs in the Location header or on the 404 page.

Generated by OpenCVE AI on April 18, 2026 at 01:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 30 Jan 2026 20:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:*
cpe:2.3:a:discourse:discourse:2025.12.0:*:*:*:stable:*:*:*
cpe:2.3:a:discourse:discourse:2026.1.0:*:*:*:stable:*:*:*
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Thu, 29 Jan 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Discourse
Discourse discourse
Vendors & Products Discourse
Discourse discourse

Wed, 28 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 28 Jan 2026 20:30:00 +0000

Type Values Removed Values Added
Description Discourse is an open source discussion platform. In versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0, permalinks pointing to access-restricted resources (private topics, categories, posts, or hidden tags) were redirecting users to URLs containing the resource slug, even when the user didn't have access to view the resource. This leaked potentially sensitive information (e.g., private topic titles) via the redirect Location header and the 404 page's search box. This issue is patched in versions 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0. No known workarounds are available.
Title Discourse allows permalinks to restricted resources to leak resource slugs to unauthorized users
Weaknesses CWE-200
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Discourse Discourse
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-28T21:07:37.739Z

Reserved: 2026-01-15T15:45:01.958Z

Link: CVE-2026-23743

cve-icon Vulnrichment

Updated: 2026-01-28T20:53:02.503Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-28T21:16:11.597

Modified: 2026-01-30T20:31:49.593

Link: CVE-2026-23743

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T01:45:33Z

Weaknesses