First published: Thu Jul 15 2021(Updated: )
Discourse is an open-source discussion platform. In Discourse versions 2.7.5 and prior, parsing and rendering of YouTube Oneboxes can be susceptible to XSS attacks. This vulnerability only affects sites which have modified or disabled Discourse's default Content Security Policy. The issue is patched in `stable` version 2.7.6, `beta` version 2.8.0.beta3, and `tests-passed` version 2.8.0.beta3. As a workaround, ensure that the Content Security Policy is enabled, and has not been modified in a way which would make it more vulnerable to XSS attacks.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse | <=2.7.5 | |
Discourse | =2.8.0-beta1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-32764 is classified as a medium severity vulnerability due to its potential for XSS attacks.
To fix CVE-2021-32764, upgrade to Discourse version 2.8.0 or later, or ensure that the default Content Security Policy is enabled.
CVE-2021-32764 affects Discourse versions 2.7.5 and prior, as well as 2.8.0-beta1.
CVE-2021-32764 can lead to XSS attacks, allowing an attacker to execute scripts in the context of a user's session.
Your site is not vulnerable to CVE-2021-32764 if you have not modified or disabled Discourse's default Content Security Policy.