First published: Wed Mar 26 2025(Updated: )
Discourse is an open-source discussion platform. Prior to versions `3.3.4` on the `stable` branch and `3.4.0.beta5` on the `beta` branch, someone who is about to reach the limit of users in a group DM may send requests to add new users in parallel. The requests might all go through ignoring the limit due to a race condition. The patch in versions `3.3.4` and `3.4.0.beta5` uses the `lock` step in service to wrap part of the `add_users_to_channel` service inside a distributed lock/mutex in order to avoid the race condition.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse | <3.3.4<3.4.0.beta5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-24808 has been classified with a severity rating that indicates a potential risk to user group management in Discourse.
To mitigate CVE-2025-24808, upgrade to Discourse version 3.3.4 or later for the stable branch, or version 3.4.0.beta5 or later for the beta branch.
CVE-2025-24808 affects Discourse prior to version 3.3.4 on the stable branch and version 3.4.0.beta5 on the beta branch.
CVE-2025-24808 is a vulnerability related to user management in group direct messages on the Discourse platform.
If you cannot upgrade, consider implementing rate limiting or monitoring user group requests to prevent abuse until an upgrade is possible.