First published: Wed Jan 05 2022(Updated: )
Discourse is an open source platform for community discussion. In affected versions when composing a message from topic the composer user suggestions reveals whisper participants. The issue has been patched in stable version 2.7.13 and beta version 2.8.0.beta11. There is no workaround for this issue and users are advised to upgrade.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse | <2.7.13 | |
Discourse | =2.8.0-beta1 | |
Discourse | =2.8.0-beta10 | |
Discourse | =2.8.0-beta2 | |
Discourse | =2.8.0-beta3 | |
Discourse | =2.8.0-beta4 | |
Discourse | =2.8.0-beta5 | |
Discourse | =2.8.0-beta6 | |
Discourse | =2.8.0-beta7 | |
Discourse | =2.8.0-beta8 | |
Discourse | =2.8.0-beta9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-21642 has a moderate severity level as it allows unintended disclosure of whisper participants in Discourse.
To fix CVE-2022-21642, upgrade to Discourse stable version 2.7.13 or beta version 2.8.0.beta11 or later.
CVE-2022-21642 affects Discourse versions prior to 2.7.13 and certain beta versions prior to 2.8.0.beta11.
CVE-2022-21642 is a vulnerability that exposes whisper participants when composing messages from a topic.
There is no known workaround for CVE-2022-21642, and upgrading is the recommended solution.