First published: Mon Oct 16 2023(Updated: )
Discourse is an open source platform for community discussion. Attackers with details specific to a poll in a topic can use the `/polls/grouped_poll_results` endpoint to view the content of options in the poll and the number of votes for groups of poll participants. This impacts private polls where the results were intended to only be viewable by authorized users. This issue is patched in the 3.1.1 stable and 3.2.0.beta2 versions of Discourse. There is no workaround for this issue apart from upgrading to the fixed version.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse Discourse | <=3.1.1 | |
Discourse Discourse | =3.2.0-beta1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-43814 is a vulnerability in the Discourse open source platform that allows attackers to view the content of options and number of votes in a poll.
CVE-2023-43814 has a severity rating of low (3.7).
CVE-2023-43814 specifically impacts private polls where the attacker has specific details about a poll in a topic.
Versions up to and including 3.1.1 of Discourse stable, and version 3.2.0-beta1 of Discourse beta are affected by CVE-2023-43814.
Yes, upgrading to a patched version of Discourse is recommended to fix CVE-2023-43814.