First published: Fri Jun 03 2022(Updated: )
Discourse is an open source platform for community discussion. Prior to version 2.8.4 on the `stable` branch and 2.9.0beta5 on the `beta` and `tests-passed` branches, inviting users on sites that use single sign-on could bypass the `must_approve_users` check and invites by staff are always approved automatically. The issue is patched in Discourse version 2.8.4 on the `stable` branch and version `2.9.0.beta5` on the `beta` and `tests-passed` branches. As a workaround, disable invites or increase `min_trust_level_to_allow_invite` to reduce the attack surface to more trusted users.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse | <2.8.4 | |
Discourse | =2.9.0-beta1 | |
Discourse | =2.9.0-beta2 | |
Discourse | =2.9.0-beta3 | |
Discourse | =2.9.0-beta4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-31025 has a medium severity rating due to its potential impact on user management.
To fix CVE-2022-31025, update Discourse to version 2.8.4 or later on the stable branch or 2.9.0-beta5 or later on the beta and tests-passed branches.
CVE-2022-31025 affects Discourse versions prior to 2.8.4 on the stable branch and 2.9.0-beta5 on the beta branch.
CVE-2022-31025 is a vulnerability that allows user invites to bypass the must_approve_users check in Discourse.
Sites using Discourse with single sign-on configurations are at risk due to CVE-2022-31025.