Description
Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, the onebox method in the SharedAiConversation model renders the conversation title directly into HTML without proper sanitization. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. As a workaround, tighten access by changing the `ai_bot_public_sharing_allowed_groups` site setting.
Published: 2026-03-19
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored XSS via unsanitized conversation title
Action: Patch
AI Analysis

Impact

The vulnerability arises when the SharedAiConversation onebox renders the conversation title directly into HTML without sanitizing user input, enabling an attacker to embed malicious scripts. Once a forged title is stored, any user who views that conversation will execute the script in their browser, potentially granting the attacker access to the user’s session or credentials. This flaw is classified as CWE‑79 – Improper Neutralization of Input During Web Page Generation.

Affected Systems

The affected product is Discourse, the open‑source discussion platform. Versions before 2026.3.0‑latest.1, 2026.2.1, and 2026.1.2 are vulnerable. These release lines include a patch that sanitizes the title. No other vendors or products are listed.

Risk and Exploitability

The CVSS score of 5.1 indicates moderate severity, and the EPSS score of less than 1% suggests a low chance of exploitation. The vulnerability is not part of CISA’s KEV catalog. Exploitation requires the attacker to be able to create a shared AI conversation – an action that is inferred to be authenticated and performed by a user with sufficient privileges. Once a malicious title is created, the stored XSS can be triggered for any user that visits the conversation page, giving the attacker a broad impact across the site.

Generated by OpenCVE AI on March 25, 2026 at 03:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Discourse to version 2026.3.0‑latest.1, 2026.2.1, or 2026.1.2 or later.
  • If an upgrade is not immediately possible, restrict the shared AI conversation feature by adjusting the ai_bot_public_sharing_allowed_groups site setting to exclude untrusted user groups.
  • Verify that no compromised conversation titles exist and ensure all stored titles are rendered safely before deploying the fixes.

Generated by OpenCVE AI on March 25, 2026 at 03:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Mar 2026 01:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:*
cpe:2.3:a:discourse:discourse:2026.3.0:*:*:*:latest:*:*:*
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Tue, 24 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Discourse
Discourse discourse
Vendors & Products Discourse
Discourse discourse

Thu, 19 Mar 2026 21:00:00 +0000

Type Values Removed Values Added
Description Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, the onebox method in the SharedAiConversation model renders the conversation title directly into HTML without proper sanitization. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. As a workaround, tighten access by changing the `ai_bot_public_sharing_allowed_groups` site setting.
Title Discourse Vulnerable to Stored XSS via Shared AI Conversation Onebox
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Discourse Discourse
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-24T19:43:07.713Z

Reserved: 2026-02-20T17:40:28.448Z

Link: CVE-2026-27570

cve-icon Vulnrichment

Updated: 2026-03-24T19:35:14.552Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-19T21:17:09.250

Modified: 2026-03-25T00:59:29.893

Link: CVE-2026-27570

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T11:54:56Z

Weaknesses