First published: Tue Feb 04 2025(Updated: )
Discourse is an open source platform for community discussion. PM titles and metadata can be read by other users when the "PM tags allowed for groups" option is enabled, the other user is a member of a group added to this option, and the PM has been tagged. This issue has been patched in the latest `stable`, `beta` and `tests-passed` versions of Discourse. Users are advised to upgrade. Users unable to upgrade should remove all groups from the the "PM tags allowed for groups" option.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse Discourse | <=latest<=beta<=tests-passed |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-56197 is classified as medium due to the potential exposure of private messages' titles and metadata.
To fix CVE-2024-56197, ensure that the "PM tags allowed for groups" option is disabled if you want to protect the privacy of PM titles and metadata.
CVE-2024-56197 affects all versions of Discourse up to the latest release, including beta and tests-passed versions.
No, CVE-2024-56197 can only be exploited by users who are part of a group that has been granted access to the tagged PMs.
If using an affected version of Discourse, it is recommended to apply the latest patch immediately to mitigate any risks associated with this vulnerability.