First published: Mon Oct 16 2023(Updated: )
Discourse is an open source platform for community discussion. Improper escaping of user input allowed for Cross-site Scripting attacks via the digest email preview UI. This issue only affects sites with CSP disabled. This issue has been patched in the 3.1.1 stable release as well as the 3.2.0.beta1 release. Users are advised to upgrade. Users unable to upgrade should ensure CSP is enabled on the forum.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse Discourse | <=3.1.1 | |
Discourse Discourse | =3.2.0-beta1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-43659 is a vulnerability in Discourse that allows for Cross-site Scripting attacks via the digest email preview UI.
CVE-2023-43659 affects Discourse versions up to and including 3.1.1 and version 3.2.0-beta1.
CVE-2023-43659 has a severity rating of 5.4 (high).
To fix CVE-2023-43659, update your Discourse instance to the 3.1.1 stable release or the 3.2.0.beta1 release.
Cross-site Scripting (XSS) is a security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.