Description
Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, the enter action in StaticController reads the sso_destination_url cookie and redirects to it with allow_other_host: true without validating the destination URL. While this cookie is normally set during legitimate DiscourseConnect Provider flows with cryptographically validated SSO payloads, cookies are client-controlled and can be set by attackers. This issue has been patched in versions 2026.1.3, 2026.2.2, and 2026.3.0.
Published: 2026-03-31
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Open Redirect
Action: Patch Immediately
AI Analysis

Impact

The vulnerability is an open redirect flaw in Discourse’s StaticController. The enter action reads an sso_destination_url cookie and redirects to that URL without validating it. Because the cookie can be set by an attacker, the application can send users to arbitrary external sites, enabling phishing or other social‑engineering attacks. The weakness corresponds to CWE‑601, an unvalidated redirect or forward.

Affected Systems

Discourse versions from 2026.1.0 up to but excluding 2026.1.3, from 2026.2.0 up to but excluding 2026.2.2, and from 2026.3.0 versions before 2026.3.0 are affected. The issue is fixed in 2026.1.3, 2026.2.2, and 2026.3.0.

Risk and Exploitability

The CVSS score of 5.1 indicates moderate severity, and the EPSS score of less than 1 % suggests the likelihood of exploitation is low. The vulnerability is not listed in the CISA KEV catalog. The attack vector is client‑side: an attacker can set the sso_destination_url cookie with a malicious URL and then direct a user to the vulnerable entry point. Upon visiting the link, the user is redirected to the attacker’s chosen site. Because no server‑side authentication or validation is performed, the redirect is guaranteed if the cookie is present.

Generated by OpenCVE AI on April 3, 2026 at 15:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Discourse patch or upgrade to version 2026.1.3, 2026.2.2, or 2026.3.0 or newer
  • If an immediate upgrade is not possible, remove or block the sso_destination_url cookie for unauthenticated users
  • Monitor incoming requests for unexpected sso_destination_url cookie values and block or log suspicious traffic

Generated by OpenCVE AI on April 3, 2026 at 15:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 12:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:discourse:discourse:*:*:*:*:latest:*:*:*
cpe:2.3:a:discourse:discourse:2026.3.0:*:*:*:latest.1:*:*:*
cpe:2.3:a:discourse:discourse:2026.3.0:*:*:*:latest:*:*:*
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Discourse
Discourse discourse
Vendors & Products Discourse
Discourse discourse

Tue, 31 Mar 2026 18:00:00 +0000

Type Values Removed Values Added
Description Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, the enter action in StaticController reads the sso_destination_url cookie and redirects to it with allow_other_host: true without validating the destination URL. While this cookie is normally set during legitimate DiscourseConnect Provider flows with cryptographically validated SSO payloads, cookies are client-controlled and can be set by attackers. This issue has been patched in versions 2026.1.3, 2026.2.2, and 2026.3.0.
Title Discourse: Open redirect via `sso_destination_url` cookie in `enter`
Weaknesses CWE-601
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N'}


Subscriptions

Discourse Discourse
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-01T13:56:12.868Z

Reserved: 2026-03-10T22:02:38.855Z

Link: CVE-2026-32113

cve-icon Vulnrichment

Updated: 2026-04-01T13:56:05.510Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-31T18:16:49.363

Modified: 2026-04-03T12:45:30.300

Link: CVE-2026-32113

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T21:17:29Z

Weaknesses