First published: Wed Dec 01 2021(Updated: )
Discourse is an open source discussion platform. In affected versions a vulnerability in the Polls feature allowed users to vote multiple times in a single-option poll. The problem is patched in the latest tests-passed, beta and stable versions of Discourse
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse | <2.7.11 | |
Discourse | =2.8.0-beta1 | |
Discourse | =2.8.0-beta2 | |
Discourse | =2.8.0-beta3 | |
Discourse | =2.8.0-beta4 | |
Discourse | =2.8.0-beta5 | |
Discourse | =2.8.0-beta6 | |
Discourse | =2.8.0-beta7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-43793 is classified as a medium severity vulnerability due to its potential to manipulate poll results.
To fix CVE-2021-43793, upgrade to the latest stable version of Discourse that contains the patch.
CVE-2021-43793 affects all Discourse versions prior to 2.8.0 and 2.7.11.
CVE-2021-43793 allows users to vote multiple times in single-option polls, compromising poll integrity.
There is no specific workaround provided for CVE-2021-43793; updating to a patched version is recommended.