First published: Mon Oct 16 2023(Updated: )
Discourse is an open source platform for community discussion. New chat messages can be read by making an unauthenticated POST request to MessageBus. This issue is patched in the 3.1.1 stable and 3.2.0.beta2 versions of Discourse. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse Discourse | <=3.1.1 | |
Discourse Discourse | =3.2.0-beta1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45131 is a vulnerability in Discourse, an open source platform for community discussion, which allows unauthenticated users to read new chat messages by making a POST request to MessageBus.
The severity of CVE-2023-45131 is high with a CVSS score of 7.5.
CVE-2023-45131 allows unauthenticated users to read new chat messages in Discourse.
To fix CVE-2023-45131, users are advised to upgrade to the patched versions of Discourse: 3.1.1 stable or 3.2.0.beta2.
There are no known workarounds for CVE-2023-45131. Upgrading to the patched versions of Discourse is recommended.