First published: Tue Feb 04 2025(Updated: )
Discourse is an open source platform for community discussion. In affected versions an attacker can execute arbitrary JavaScript on users' browsers by posting a malicious video placeholder html element. This issue only affects sites with CSP disabled. This problem has been patched in the latest version of Discourse. Users are advised to upgrade. Users unable to upgrade should enable CSP.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse Discourse |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-22602 is considered a high severity vulnerability due to its potential for executing arbitrary JavaScript in users' browsers.
To fix CVE-2025-22602, ensure that Content Security Policy (CSP) is enabled on your Discourse installation.
CVE-2025-22602 affects all versions of Discourse that have CSP disabled.
The impact of CVE-2025-22602 includes the possibility for attackers to run malicious scripts in the browsers of users visiting the affected Discourse site.
Yes, a patch for CVE-2025-22602 has been released and is available for users to apply.