Description
Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, the `ip_address` of a flagged user is exposed to any user who can access the review queue, including users who should not be able to see IP addresses. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. No known workarounds are available.
Published: 2026-03-20
Score: 3.5 Low
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized disclosure of IP addresses of flagged users
Action: Immediate Patch
AI Analysis

Impact

Discourse’s review queue interface inadvertently exposed the IP address of flagged users to any user who could access the queue, including roles that should not see such information. This allows an attacker to learn the precise source address of a user who was flagged for moderation, potentially facilitating user profiling or targeted abuse. The vulnerability falls under the confidentiality vulnerability class (CWE‑200) and does not grant any additional control or denial of service capabilities.

Affected Systems

The flaw affects the Discourse open‑source forum platform on versions older than 2026.3.0‑latest.1, 2026.2.1, and 2026.1.2. All instances running those older releases were vulnerable; the patch is included in the mentioned newer versions. No specific hardware or operating system requirements are stated, and the issue is confined to the Discourse software itself.

Risk and Exploitability

The vulnerability carries a CVSS score of 3.5, indicating low to moderate overall risk, and an EPSS score lower than 1 %, suggesting a very low probability of exploitation in the wild. The issue is not in the CISA KEV catalog. Based on the description, the likely attack vector is an authenticated user with access to the review queue, which may include moderators or users who have inadvertently been granted higher visibility privileges. No external code execution or privilege escalation is possible; the impact is limited to the accidental disclosure of the IP address.

Generated by OpenCVE AI on March 24, 2026 at 22:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official patch to all Discourse instances, upgrading to 2026.3.0‑latest.1 or newer, 2026.2.1 or 2026.1.2.
  • Verify that the review queue interface no longer exposes IP addresses; test with a non‑privileged account.
  • If an immediate update is not feasible, restrict or disable access to the review queue for non‑admin users through Discourse permission settings and audit the changes.

Generated by OpenCVE AI on March 24, 2026 at 22:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:*
cpe:2.3:a:discourse:discourse:2026.3.0:*:*:*:latest:*:*:*

Tue, 24 Mar 2026 02:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Discourse
Discourse discourse
Vendors & Products Discourse
Discourse discourse

Sat, 21 Mar 2026 05:30:00 +0000

Type Values Removed Values Added
Description Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, the `ip_address` of a flagged user is exposed to any user who can access the review queue, including users who should not be able to see IP addresses. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. No known workarounds are available.
Title Discourse exposes ip_address of flagged user
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 3.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N'}


Subscriptions

Discourse Discourse
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-24T02:10:31.793Z

Reserved: 2026-03-19T18:45:22.432Z

Link: CVE-2026-33422

cve-icon Vulnrichment

Updated: 2026-03-24T02:10:27.393Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-20T23:16:47.830

Modified: 2026-03-24T21:11:46.633

Link: CVE-2026-33422

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:33:53Z

Weaknesses