Impact
The flaw resides in the discourse-policy plugin of the Discourse forum platform. A user with permission to create or edit policies can exploit the add‑users‑to‑group capability to forcefully join any private or restricted group. This sidesteps the normal access controls and lets the user read topics that are otherwise protected to group members. The weakness involves improper authorization logic, classified as CWE‑863.
Affected Systems
Discourse, the open‑source discussion software, is affected. Versions older than 2026.3.0‑latest.1, prior to 2026.2.1, and prior to 2026.1.2. The patch is supplied in releases 2026.3.0‑latest.1, 2026.2.1, and 2026.1.2.
Risk and Exploitability
The CVSS score of 2.3 indicates low severity, yet the vulnerability permits privilege escalation within the application for users with policy‑creation rights. EPSS is below 1%, implying low exploitation probability. It is not listed in the CISA KEV catalog. The attack vector is application‑level and requires an authenticated user who currently has permission to create or modify policies; no external network exposure is needed. This inference is based on the description provided.
OpenCVE Enrichment