First published: Tue Jan 30 2024(Updated: )
Discourse is an open-source discussion platform. Improperly sanitized user input could lead to an XSS vulnerability in some situations. This vulnerability only affects Discourse instances which have disabled the default Content Security Policy. The vulnerability is patched in 3.1.5 and 3.2.0.beta5. As a workaround, ensure Content Security Policy is enabled and does not include `unsafe-inline`.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse Discourse | <3.1.5 | |
Discourse Discourse | <3.2.0 | |
Discourse Discourse | =3.2.0-beta1 | |
Discourse Discourse | =3.2.0-beta2 | |
Discourse Discourse | =3.2.0-beta3 | |
Discourse Discourse | =3.2.0-beta4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.