First published: Tue Jun 13 2023(Updated: )
Discourse is an open source discussion platform. Prior to version 3.0.4 of the `stable` branch and version 3.1.0.beta5 of the `beta` and `tests-passed` branches, the lack of restrictions on the iFrame tag makes it easy for an attacker to exploit the vulnerability and hide subsequent comments from other users. This issue is patched in version 3.0.4 of the `stable` branch and version 3.1.0.beta5 of the `beta` and `tests-passed` branches. There are no known workarounds.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse Discourse | <3.0.4 | |
Discourse Discourse | =3.1.0-beta1 | |
Discourse Discourse | =3.1.0-beta2 | |
Discourse Discourse | =3.1.0-beta3 | |
Discourse Discourse | =3.1.0-beta4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32061 is a vulnerability in the Discourse open source discussion platform that allows an attacker to hide subsequent comments from other users.
The severity of CVE-2023-32061 is medium with a CVSS score of 5.3.
Versions up to and including Discourse 3.0.4 of the stable branch and Discourse 3.1.0.beta5 of the beta and tests-passed branches are affected by CVE-2023-32061.
An attacker can exploit CVE-2023-32061 by taking advantage of the lack of restrictions on the iFrame tag in Discourse, allowing them to hide subsequent comments from other users.
Yes, upgrading to Discourse version 3.0.4 of the stable branch or version 3.1.0.beta5 of the beta and tests-passed branches will fix CVE-2023-32061.