Impact
Authorized users of a Discourse instance can read the name and structured content of form templates that belong to categories they are not authorized to access, thereby exposing site configuration metadata. The flaw is a missing authorization check, classified as CWE-862, and allows the disclosure of internal configuration information without providing additional privileges or compromising other data.
Affected Systems
The vulnerability affects the open‑source Discourse discussion platform. Versions prior to 2026.1.4, 2026.3.1, 2026.4.1, and 2026.5.0-latest.1 are impacted. Users deploying older releases of Discourse with the form templates feature enabled are susceptible to the information disclosure.
Risk and Exploitability
The CVSS score is 6, indicating moderate severity. No EPSS data is available, and the issue is not listed in the CISA KEV catalog. The attack requires an authenticated account with the form templates feature enabled; an attacker can then request templates tied to unapproved categories to learn sensitive configuration details. Because the flaw is limited to metadata exposure, the impact does not extend to arbitrary code execution or other privileges. Prompt mitigation is still recommended.
OpenCVE Enrichment