First published: Tue Feb 04 2025(Updated: )
Discourse is an open source platform for community discussion. In affected versions an attacker can make craft an XHR request to poison the anonymous cache (for example, the cache may have a response with missing preloaded data). This issue only affects anonymous visitors of the site. This problem has been patched in the latest version of Discourse. Users are advised to upgrade. Users unable to upgrade should disable anonymous cache by setting the `DISCOURSE_DISABLE_ANON_CACHE` environment variable to a non-empty value.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse Discourse |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-55948 has been classified as a moderate severity vulnerability.
To fix CVE-2024-55948, update Discourse to the latest version that addresses this vulnerability.
CVE-2024-55948 affects anonymous visitors of the Discourse platform.
CVE-2024-55948 involves an attacker crafting an XHR request to poison the anonymous cache.
Yes, CVE-2024-55948 can potentially lead to the exposure of preloaded data for anonymous visitors.