Description
Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, the discourse-subscriptions plugin leaks stripe API keys across sites in a multisite cluster resulting in the potential for stripe related information to be leaked across sites within the same multisite cluster. This issue has been patched in versions 2026.1.3, 2026.2.2, and 2026.3.0.
Published: 2026-03-31
Score: 2 Low
EPSS: n/a
KEV: No
Impact: Information Disclosure
Action: Apply Patch
AI Analysis

Impact

The discourse-subscriptions plugin for the open‑source Discourse platform unintentionally exposes Stripe API keys across all sites in a multisite cluster. When a site accesses its Stripe credentials, the plugin does not isolate them to that site, allowing an attacker to view the credentials for every other site in the same cluster. This leakage can reveal sensitive billing information and potentially enable unauthorized billing actions, representing a classic information‑disclosure weakness identified as CWE‑200.

Affected Systems

Discourse community instances running the discourse‑subscriptions plugin from any of the following release ranges are affected: 2026.1.0 through 2026.1.2, 2026.2.0 through 2026.2.1, and 2026.3.0 prior to 2026.3.0. The issue was fixed in releases 2026.1.3, 2026.2.2, and 2026.3.0; applying those updates removes the cross‑site credential leak.

Risk and Exploitability

The CVSS score of 2 reflects a low severity rating, and no EPSS score is available. The vulnerability is not listed in the CISA KEV catalog, indicating no confirmed public exploits. The likely attack vector is a user with legitimate access to one site within the multisite cluster who can then read the Stripe keys of other sites; it is also inferred that a compromised cluster network could provide broader access. Because the affected data are billing credentials, the confidentiality impact is significant even if the overall risk rating remains low to moderate. Prompt remediation is advised to eliminate the potential for cross‑site credential exposure.

Generated by OpenCVE AI on March 31, 2026 at 20:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the 2026.1.3, 2026.2.2, or 2026.3.0 patch to all Discourse instances in the multisite cluster.
  • Verify that the stripe_api_key is no longer accessible across sites by attempting cross‑site credential reads or reviewing the plugin configuration.
  • If an immediate update is not feasible, restrict administrative and community access to trusted individuals and isolate the cluster network to limit exposure until the patch can be applied.

Generated by OpenCVE AI on March 31, 2026 at 20:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Discourse
Discourse discourse
Vendors & Products Discourse
Discourse discourse

Tue, 31 Mar 2026 18:00:00 +0000

Type Values Removed Values Added
Description Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, the discourse-subscriptions plugin leaks stripe API keys across sites in a multisite cluster resulting in the potential for stripe related information to be leaked across sites within the same multisite cluster. This issue has been patched in versions 2026.1.3, 2026.2.2, and 2026.3.0.
Title discourse-subscriptions plugin leaking stripe API key in multisite environment
Weaknesses CWE-200
References
Metrics cvssV4_0

{'score': 2, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Discourse Discourse
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-31T17:38:59.916Z

Reserved: 2026-03-17T19:27:06.344Z

Link: CVE-2026-33073

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-31T18:16:51.807

Modified: 2026-03-31T18:16:51.807

Link: CVE-2026-33073

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:37:43Z

Weaknesses