BIT-discourse-2025-68659

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/discourse/BIT-discourse-2025-68659.json
JSON Data
https://api.osv.dev/v1/vulns/BIT-discourse-2025-68659
Aliases
Published
2026-02-02T08:42:14.606Z
Modified
2026-02-02T09:25:55.458718Z
Summary
Discourse has DoS vulnerability in username change endpoint
Details

Discourse is an open source discussion platform. Versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0 have an application level denial of service vulnerabilityin the username change functionality at try.discourse.org. The vulnerability allows attackers to cause noticeable server delays and resource exhaustion by sending large JSON payloads to the username preference endpoint PUT /u//preferences/username, resulting in degraded performance for other users and endpoints. This issue is patched in versions 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0. No known workarounds are available.

Database specific
{
    "cpes": [
        "cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:*"
    ],
    "severity": "Medium"
}
References

Affected packages

Bitnami / discourse

Package

Name
discourse
Purl
pkg:bitnami/discourse

Severity

  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.5.4
Introduced
2025.11.0
Fixed
2025.11.2
Introduced
2025.12.0
Fixed
2025.12.1
Introduced
2026.1.0
Fixed
2026.1.0

Database specific

source
"https://github.com/bitnami/vulndb/tree/main/data/discourse/BIT-discourse-2025-68659.json"