Description
Discourse is an open-source discussion platform. Versions prior to 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 have a potential stored XSS in topic titles for the solved posts stream. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. As a workaround, ensure that the Content Security Policy is enabled, and has not been modified in a way which would make it more vulnerable to XSS attacks.
Published: 2026-03-20
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored XSS in topic titles
Action: Patch Immediately
AI Analysis

Impact

Discourse forums allow administrators to post topics. This vulnerability stems from insufficient sanitization of topic titles in the solved posts stream. As a result, an attacker could store malicious JavaScript in a title. When a user opens the solved stream, the injected script would execute in the victim’s browser, giving the attacker control over the client context. Based on the description, it is inferred that such execution could lead to session hijacking or other client‑side attacks.

Affected Systems

Discourse, the open‑source discussion platform, is affected. All instances running any version earlier than the following patched releases are vulnerable: 2026.3.0-latest.1, 2026.2.1, and 2026.1.2. Versions that include the patch sanitize the title rendering for the solved stream. The affected products are identified by the CPE strings that reference the core Discourse application.

Risk and Exploitability

The CVSS base score of 5.4 indicates a moderate severity for this stored XSS flaw. The EPSS score of less than 1 % suggests a low probability of exploitation in the near term. The vulnerability is not listed in CISA’s Known Exploited Vulnerabilities catalog. Attackers would need the ability to create or edit a topic in the solved stream and rely on users visiting that page to trigger the embedded script. While the likelihood of exploitation is low, the impact on user data and trust warrants prompt remediation.

Generated by OpenCVE AI on March 24, 2026 at 22:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a patched release (2026.3.0-latest.1, 2026.2.1, or 2026.1.2) or newer.
  • If an upgrade cannot be performed immediately, ensure that a Content Security Policy is enabled and has not been altered to allow inline scripts or unsafe sources.
  • Review topic title inputs to confirm they are properly sanitized before storage.

Generated by OpenCVE AI on March 24, 2026 at 22:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:*
cpe:2.3:a:discourse:discourse:2026.3.0:*:*:*:latest:*:*:*

Tue, 24 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Discourse
Discourse discourse
Vendors & Products Discourse
Discourse discourse

Sat, 21 Mar 2026 05:30:00 +0000

Type Values Removed Values Added
Description Discourse is an open-source discussion platform. Versions prior to 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 have a potential stored XSS in topic titles for the solved posts stream. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. As a workaround, ensure that the Content Security Policy is enabled, and has not been modified in a way which would make it more vulnerable to XSS attacks.
Title Discourse's solved topic stream has potential stored XSS in topic title
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}


Subscriptions

Discourse Discourse
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-24T18:03:07.240Z

Reserved: 2026-03-19T17:02:34.171Z

Link: CVE-2026-33411

cve-icon Vulnrichment

Updated: 2026-03-24T18:02:58.208Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-20T23:16:47.660

Modified: 2026-03-24T21:11:01.230

Link: CVE-2026-33411

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:33:57Z

Weaknesses