Description
Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, an attacker with the ability to create shared AI conversations could inject arbitrary HTML and JavaScript via crafted conversation titles. This payload would execute in the browser of any user viewing the onebox preview, potentially allowing session hijacking or unauthorized actions on behalf of the victim. This issue has been patched in versions 2026.1.3, 2026.2.2, and 2026.3.0.
Published: 2026-03-31
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored XSS
Action: Patch Immediately
AI Analysis

Impact

The vulnerability allows an attacker to inject arbitrary HTML and JavaScript into the title of a shared AI conversation in Discourse, leading to stored client-side script execution when other users view the onebox preview. By executing malicious code in the victim’s browser, an attacker could hijack sessions or perform unauthorized actions on behalf of the viewer. The weakness is a classic stored cross-site scripting flaw identified as CWE-79.

Affected Systems

Discourse, the open-source discussion platform, is affected. Versions from 2026.1.0 up to but not including 2026.1.3, from 2026.2.0 up to but not including 2026.2.2, and from 2026.3.0 up to but not including 2026.3.0 contain the flaw; the issue was fixed in 2026.1.3, 2026.2.2, and 2026.3.0 respectively.

Risk and Exploitability

The CVSS base score is 5.3, indicating a medium severity. The EPSS probability is less than 1 %, suggesting a low likelihood of current exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers would need the ability to create and share AI conversations, so the threat is limited to users with that permission. Once an attacker supplies a malicious conversation title, the payload executes in every browser that renders the onebox, giving attackers a client-side attack surface.

Generated by OpenCVE AI on April 9, 2026 at 21:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to Discourse 2026.1.3, 2026.2.2, or 2026.3.0 or later
  • Disable the shared AI conversation feature if an upgrade is not feasible
  • Sanitize or escape all shared conversation titles to prevent script injection

Generated by OpenCVE AI on April 9, 2026 at 21:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 09 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:discourse:discourse:*:*:*:*:latest:*:*:*
cpe:2.3:a:discourse:discourse:2026.3.0:*:*:*:latest.1:*:*:*
cpe:2.3:a:discourse:discourse:2026.3.0:*:*:*:latest:*:*:*

Fri, 03 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Discourse
Discourse discourse
Vendors & Products Discourse
Discourse discourse

Tue, 31 Mar 2026 18:00:00 +0000

Type Values Removed Values Added
Description Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, an attacker with the ability to create shared AI conversations could inject arbitrary HTML and JavaScript via crafted conversation titles. This payload would execute in the browser of any user viewing the onebox preview, potentially allowing session hijacking or unauthorized actions on behalf of the victim. This issue has been patched in versions 2026.1.3, 2026.2.2, and 2026.3.0.
Title Discourse: Stored XSS in discourse-ai shared conversations onebox
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Discourse Discourse
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-03T16:18:12.209Z

Reserved: 2026-03-11T14:47:05.685Z

Link: CVE-2026-32243

cve-icon Vulnrichment

Updated: 2026-04-03T16:18:06.975Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-31T18:16:49.740

Modified: 2026-04-09T19:31:50.117

Link: CVE-2026-32243

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:46:11Z

Weaknesses