Description
Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, unauthenticated users can determine whether a specific user is a member of a private group by observing changes in directory results when using the `exclude_groups` parameter. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. As a workaround, disable public access to the user directory via Admin → Settings → hide user profiles from public.
Published: 2026-03-20
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Apply Patch
AI Analysis

Impact

This vulnerability allows an unauthenticated user to infer whether a specific individual belongs to a private group within the Discourse platform by observing differences in directory query results when the exclude_groups parameter is used. The flaw is a manifestation of information disclosure weaknesses identified by CWE‑203, CWE‑639, and CWE‑862. Because no code is executed or system state is altered, the impact is limited to revealing membership status, which can compromise user privacy and enable social engineering of the target. The vulnerability is triggered by including the exclude_groups parameter in a public directory request and monitoring the presence or absence of user entries.

Affected Systems

Discourse, the open‑source discussion platform, is affected in all releases older than 2026.3.0‑latest.1, 2026.2.1, and 2026.1.2. Those specific releases contain the patch that removes the inferential leakage.

Risk and Exploitability

The CVSS score of 6.9 indicates moderate severity, and the EPSS score of less than 1 percent suggests a low probability of exploitation in the wild. The flaw is not listed in the CISA KEV catalog. Exploitation is straightforward: an attacker sends an unauthenticated HTTP request to the public directory endpoint, supplies the exclude_groups parameter, and inspects the returned list to determine group membership. No special privileges or credentials are required, and the attack can be performed by any observer of the public directory API.

Generated by OpenCVE AI on March 24, 2026 at 21:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Discourse to version 2026.3.0‑latest.1, 2026.2.1, or 2026.1.2, which include the fix.
  • If an update cannot be applied immediately, disable public access to the user directory by navigating to Admin → Settings → hide user profiles from public.
  • Confirm that the user directory is no longer publicly accessible and monitor access logs for suspicious activity.

Generated by OpenCVE AI on March 24, 2026 at 21:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:*
cpe:2.3:a:discourse:discourse:2026.3.0:*:*:*:latest:*:*:*
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Mon, 23 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Discourse
Discourse discourse
Vendors & Products Discourse
Discourse discourse

Sat, 21 Mar 2026 05:30:00 +0000

Type Values Removed Values Added
Description Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, unauthenticated users can determine whether a specific user is a member of a private group by observing changes in directory results when using the `exclude_groups` parameter. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. As a workaround, disable public access to the user directory via Admin → Settings → hide user profiles from public.
Title Discourse has inferable private group membership or existence via exclude_groups parameter
Weaknesses CWE-203
CWE-639
CWE-862
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Discourse Discourse
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-23T16:48:49.363Z

Reserved: 2026-03-19T18:45:22.433Z

Link: CVE-2026-33425

cve-icon Vulnrichment

Updated: 2026-03-23T16:48:46.202Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-21T00:16:27.010

Modified: 2026-03-24T19:41:56.957

Link: CVE-2026-33425

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:33:49Z

Weaknesses