First published: Tue Feb 04 2025(Updated: )
Discourse is an open source platform for community discussion. In affected versions an attacker can trick a target user to make changes to their own username via carefully crafted link using the `activate-account` route. This problem has been patched in the latest version of Discourse. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse Discourse |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-22601 has been classified as a medium severity vulnerability.
To fix CVE-2025-22601, update Discourse to the latest patched version.
Users of Discourse versions prior to the security patch are affected by CVE-2025-22601.
CVE-2025-22601 is associated with social engineering attacks where an attacker manipulates users to change their own usernames.
The impact of CVE-2025-22601 allows an attacker to change a victim's username on the Discourse platform.