Impact
Discourse allows a user to read any hidden post revision via the /posts/:id.json?version path before certain releases. The endpoint bypasses checks that should enforce visibility, so staff‑hidden patches can be exposed to anyone who has access to the forum. This provides indirect confidentiality breach of content intended to remain internal.
Affected Systems
Vulnerable for all Discourse releases older than 2026.3.0‑latest.1, 2026.2.1, and 2026.1.2. The platform is the open‑source forum software Discourse.
Risk and Exploitability
CVSS 5.3 indicates moderate severity; EPSS <1% suggests low exploitation probability and it is not in CISA KEV. The issue is exploitable via a simple HTTP GET against the affected endpoint, requiring only knowledge of the post ID and a revision number. Because the system does not enforce visibility, any user who can enumerate revisions can read content that should be hidden, posing a confidentiality risk for staff‑sanctioned edits.
OpenCVE Enrichment