Description
Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, users who do not belong to the allowed policy creation groups can create functional policy acceptance widgets in posts under the right conditions. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. As a workaround, disable the discourse-policy plugin by disabling the `policy_enabled` site setting.
Published: 2026-03-19
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation via Unauthorized Policy Creation
Action: Immediate Patch
AI Analysis

Impact

Discourse versions prior to 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 allow users who are not members of the authorized policy‑creation groups to create functional policy acceptance widgets within posts. This missing permission check lets an attacker gain elevated capabilities by inserting policy widgets that can be used to enforce or manipulate acceptance rules without proper authorization. The vulnerability is a classic privilege escalation (CWE‑862), capable of compromising the confidentiality and integrity of policy enforcement within the platform.

Affected Systems

The affected systems are installations of the Discourse discussion platform, specifically those running any version older than 2026.3.0-latest.1, 2026.2.1, or 2026.1.2. The vulnerability is tied to the discourse-policy plugin, which is enabled by default via the `policy_enabled` setting.

Risk and Exploitability

The CVSS score of 8.2 indicates a high severity risk. Exploitation is likely possible through normal user interaction, such as authoring posts, and the EPSS score of less than 1% suggests that, while the vulnerability exists, the probability of active exploitation is currently low. This vulnerability is not listed in the CISA KEV catalog. An attacker could leverage this flaw to install unauthorized policy widgets, potentially bypassing organizational controls or misrepresenting policy compliance. The attack vector is inferred to be remote, via the web interface, where a non‑privileged user crafts a post to trigger the vulnerability.

Generated by OpenCVE AI on March 24, 2026 at 03:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Discourse to a patched release (2026.3.0‑latest.1, 2026.2.1, or 2026.1.2).
  • If an immediate upgrade is not feasible, disable the discourse-policy plugin by setting the site setting `policy_enabled` to false to block new policy widget creation.
  • After disabling the plugin, verify that it remains inactive and monitor application logs for attempts to create unauthorized policy widgets.

Generated by OpenCVE AI on March 24, 2026 at 03:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 02:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:*
cpe:2.3:a:discourse:discourse:2026.3.0:*:*:*:latest:*:*:*
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}


Fri, 20 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Discourse
Discourse discourse
Vendors & Products Discourse
Discourse discourse

Thu, 19 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Description Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, users who do not belong to the allowed policy creation groups can create functional policy acceptance widgets in posts under the right conditions. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. As a workaround, disable the discourse-policy plugin by disabling the `policy_enabled` site setting.
Title Discourse missing permission check for policy creation in discourse-policy
Weaknesses CWE-862
References
Metrics cvssV4_0

{'score': 8.2, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Discourse Discourse
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-20T16:27:46.085Z

Reserved: 2026-03-03T20:51:43.482Z

Link: CVE-2026-29072

cve-icon Vulnrichment

Updated: 2026-03-20T16:27:42.504Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-19T22:16:31.477

Modified: 2026-03-23T20:11:17.333

Link: CVE-2026-29072

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T11:54:38Z

Weaknesses