Description
Discourse is an open-source discussion platform. Versions prior to 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 allow a moderator to edit site policy documents (ToS, guidelines, privacy policy) that they are explicitly prohibited from modifying. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. No known workarounds are available.
Published: 2026-03-20
Score: 2.2 Low
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Apply patch
AI Analysis

Impact

Discourse, the open‑source discussion platform, contains a flaw that allows a moderator to craft a request to the suspend/silence endpoint with an arbitrary post_id. Through this avenue the moderator can edit site policy documents—such as the Terms of Service, community guidelines, and privacy policy—that are normally protected from modification. This flaw removes a critical guardrail, enabling the unauthorized alteration of the legal and operational framework of the site.

Affected Systems

The vulnerability affects Discourse releases older than 2026.3.0‑latest.1, 2026.2.1, and 2026.1.2. Any installation running one of those pre‑patched versions is susceptible. The affected product is identified as Discourse by the CNA, and the specific versions are listed in the advisory.

Risk and Exploitability

The CVSS score of 2.2 indicates a low severity rating, and an EPSS score of less than 1% suggests that exploitation is unlikely in the wild. The description does not indicate an external attack vector; based on the information, it is inferred that the exploit requires a moderator account, which is a role normally granted to trusted staff. Because the vulnerability is not present in the CISA KEV catalog, there is no evidence of active exploitation. The overall risk to an organization is therefore low, assuming that only legitimate moderators have access and have not abused their elevated permissions.

Generated by OpenCVE AI on March 24, 2026 at 22:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Discourse to the patched release 2026.3.0‑latest.1, 2026.2.1, or 2026.1.2
  • Verify that policy documents are no longer editable by moderator accounts after the update
  • Audit moderator activity logs for any unauthorized policy edits
  • Apply least‑privilege controls to restrict moderator permissions to only what is necessary for their role

Generated by OpenCVE AI on March 24, 2026 at 22:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:*
cpe:2.3:a:discourse:discourse:2026.3.0:*:*:*:latest:*:*:*

Sat, 21 Mar 2026 05:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Discourse
Discourse discourse
Vendors & Products Discourse
Discourse discourse

Fri, 20 Mar 2026 03:15:00 +0000

Type Values Removed Values Added
Description Discourse is an open-source discussion platform. Versions prior to 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 allow a moderator to edit site policy documents (ToS, guidelines, privacy policy) that they are explicitly prohibited from modifying. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. No known workarounds are available.
Title Discourse has moderator privilege escalation via arbitrary post_id in suspend/silence endpoint
Weaknesses CWE-269
References
Metrics cvssV3_1

{'score': 2.2, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Discourse Discourse
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-21T02:54:32.524Z

Reserved: 2026-03-06T00:04:56.700Z

Link: CVE-2026-30888

cve-icon Vulnrichment

Updated: 2026-03-21T02:54:28.617Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-20T03:15:58.860

Modified: 2026-03-24T19:59:16.103

Link: CVE-2026-30888

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:09:35Z

Weaknesses