Description
Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, users who lost access to a topic (e.g., removed from a private category group) could still interact with polls in that topic, including voting and toggling poll status. No content was exposed, but users could modify poll state in topics they should no longer have access to. This issue has been patched in versions 2026.1.3, 2026.2.2, and 2026.3.0.
Published: 2026-03-31
Score: 6.3 Medium
EPSS: n/a
KEV: No
Impact: Unauthorized poll manipulation in private categories
Action: Apply Patch
AI Analysis

Impact

Discourse implements topic‑level privacy controls that should prevent users who are no longer members of a private category from interacting with polls embedded in those topics. In the affected releases the check was insufficient, allowing such users to vote or toggle the open/closed state of polls, even though no poll contents were revealed. The flaw is an authorization weakness (CWE‑285) that lets an attacker tamper with poll outcomes without additional privileges.

Affected Systems

The issue impacts Discourse releases beginning with 2026.1.0 and continuing through 2026.1.2, then releases starting with 2026.2.0 up to 2026.2.1, and the 2026.3.0 release before the patch. The vulnerability is fixed in releases 2026.1.3, 2026.2.2, 2026.3.0 and newer.

Risk and Exploitability

The CVSS score of 6.3 indicates medium severity. EPSS data is unavailable, and the vulnerability is not listed in the CISA KEV catalog, so the likelihood of exploitation in the wild is uncertain. An attacker would need a valid authenticated session and must have previously had access to the private category; once removed, the user could still exploit poll endpoints to alter results.

Generated by OpenCVE AI on March 31, 2026 at 20:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Discourse to release 2026.1.3, 2026.2.2, 2026.3.0 or later.
  • Verify that users without access to private categories can no longer vote in polls or change poll state before deploying the update.

Generated by OpenCVE AI on March 31, 2026 at 20:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Discourse
Discourse discourse
Vendors & Products Discourse
Discourse discourse

Tue, 31 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 31 Mar 2026 18:00:00 +0000

Type Values Removed Values Added
Description Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, users who lost access to a topic (e.g., removed from a private category group) could still interact with polls in that topic, including voting and toggling poll status. No content was exposed, but users could modify poll state in topics they should no longer have access to. This issue has been patched in versions 2026.1.3, 2026.2.2, and 2026.3.0.
Title Discourse: Insufficient topic visibility check allows unauthorized poll manipulation in private categories
Weaknesses CWE-285
References
Metrics cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Discourse Discourse
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-31T18:52:26.060Z

Reserved: 2026-03-12T15:29:36.557Z

Link: CVE-2026-32619

cve-icon Vulnrichment

Updated: 2026-03-31T18:50:12.684Z

cve-icon NVD

Status : Received

Published: 2026-03-31T18:16:50.523

Modified: 2026-03-31T18:16:50.523

Link: CVE-2026-32619

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:37:36Z

Weaknesses