Description
Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, an authenticated user can obtain shared draft topic titles by sending an inline onebox request with a category_id parameter matching the shared drafts category. This issue has been patched in versions 2026.1.3, 2026.2.2, and 2026.3.0.
Published: 2026-03-31
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized disclosure of shared draft topic titles
Action: Patch
AI Analysis

Impact

An internal authorization flaw within Discourse’s oneboxer component allows an authenticated user to request inline onebox data using a category_id that matches the shared drafts category. By sending such a request, the user receives the titles of draft topics stored in that category. The vulnerability exposes content that the user should not view, resulting in a confidentiality breach of internal draft information. The weakness corresponds to improper authorization checks (CWE-200).

Affected Systems

Discourse instances running any release between 2026.1.0-latest up to, but not including, 2026.1.3; 2026.2.0-latest up to, but not including, 2026.2.2; and 2026.3.0-latest up to, but not including, 2026.3.0 are affected. Versions 2026.1.3, 2026.2.2, and 2026.3.0 and newer contain a patch that removes the vulnerability.

Risk and Exploitability

The CVSS base score of 4.3 indicates moderate impact with limited exploitation scope. An EPSS score of less than 1% reflects a low probability of real-world exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers must be authenticated to the system to trigger the flaw, and the attack vector is a crafted online request to the onebox endpoint. Because the issue manifests through user-controlled input, exploitation is straightforward for legitimate users with access. However, the lack of a public exploit and low probability of exploitation reduce immediate threat, though the confidentiality risk remains relevant in environments where draft content is sensitive.

Generated by OpenCVE AI on April 9, 2026 at 16:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to Discourse 2026.1.3 or later, which includes the patch

Generated by OpenCVE AI on April 9, 2026 at 16:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 09 Apr 2026 15:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:discourse:discourse:*:*:*:*:latest:*:*:*
cpe:2.3:a:discourse:discourse:2026.3.0:*:*:*:latest.1:*:*:*
cpe:2.3:a:discourse:discourse:2026.3.0:*:*:*:latest:*:*:*

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Discourse
Discourse discourse
Vendors & Products Discourse
Discourse discourse

Tue, 31 Mar 2026 18:00:00 +0000

Type Values Removed Values Added
Description Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, an authenticated user can obtain shared draft topic titles by sending an inline onebox request with a category_id parameter matching the shared drafts category. This issue has been patched in versions 2026.1.3, 2026.2.2, and 2026.3.0.
Title Discourse: Authorization bypass in oneboxer via user-controlled category id
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Discourse Discourse
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-01T18:33:42.891Z

Reserved: 2026-03-17T00:05:53.285Z

Link: CVE-2026-32951

cve-icon Vulnrichment

Updated: 2026-04-01T18:33:40.326Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-31T18:16:51.530

Modified: 2026-04-09T15:32:00.633

Link: CVE-2026-32951

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:46:03Z

Weaknesses