Description
Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, users who lost access to a topic (e.g., removed from a private category group) could still interact with polls in that topic, including voting and toggling poll status. No content was exposed, but users could modify poll state in topics they should no longer have access to. This issue has been patched in versions 2026.1.3, 2026.2.2, and 2026.3.0.
Published: 2026-03-31
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized poll manipulation due to insufficient visibility checks
Action: Patch
AI Analysis

Impact

The vulnerability allows a user who has lost access to a topic to still interact with polls within that topic, including voting and toggling the poll status. This creates an access control bypass that can be used to manipulate poll outcomes without exposing content. The impact is therefore a privilege escalation that enables malicious users to influence poll results, potentially disrupting community moderation or decision-making processes.

Affected Systems

Discourse platform versions 2026.1.0 through 2026.1.2, 2026.2.0 through 2026.2.1, and 2026.3.0 prior to the 2026.3.0 release are affected. The issue was addressed in the 2026.1.3, 2026.2.2, and 2026.3.0 patches.

Risk and Exploitability

The CVSS score of 6.3 indicates a moderate severity. EPSS shows an exploitation probability of less than 1%, and the flaw is not listed in the CISA KEV catalog. An attacker can exploit this by authenticating to the site and using normal poll endpoints, so the vector is likely remote and web‑based. Given the low probability of exploitation and lack of a publicly available exploit, the risk is moderate, but the impact of poll manipulation can be significant for community trust and decision integrity.

Generated by OpenCVE AI on April 9, 2026 at 19:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify the current Discourse version in use
  • Upgrade to Discourse 2026.1.3 or later, 2026.2.2 or later, or 2026.3.0 or later
  • If an upgrade is not immediately possible, restrict poll management privileges in private categories or disable polls in those categories
  • Monitor logs for unauthorized poll activity and review user permissions regularly

Generated by OpenCVE AI on April 9, 2026 at 19:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 09 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:discourse:discourse:*:*:*:*:latest:*:*:*
cpe:2.3:a:discourse:discourse:2026.3.0:*:*:*:latest.1:*:*:*
cpe:2.3:a:discourse:discourse:2026.3.0:*:*:*:latest:*:*:*
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Discourse
Discourse discourse
Vendors & Products Discourse
Discourse discourse

Tue, 31 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 31 Mar 2026 18:00:00 +0000

Type Values Removed Values Added
Description Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, users who lost access to a topic (e.g., removed from a private category group) could still interact with polls in that topic, including voting and toggling poll status. No content was exposed, but users could modify poll state in topics they should no longer have access to. This issue has been patched in versions 2026.1.3, 2026.2.2, and 2026.3.0.
Title Discourse: Insufficient topic visibility check allows unauthorized poll manipulation in private categories
Weaknesses CWE-285
References
Metrics cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Discourse Discourse
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-31T18:52:26.060Z

Reserved: 2026-03-12T15:29:36.557Z

Link: CVE-2026-32619

cve-icon Vulnrichment

Updated: 2026-03-31T18:50:12.684Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-31T18:16:50.523

Modified: 2026-04-09T18:30:09.837

Link: CVE-2026-32619

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:46:05Z

Weaknesses