BIT-discourse-2026-24742

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/discourse/BIT-discourse-2026-24742.json
JSON Data
https://api.osv.dev/v1/vulns/BIT-discourse-2026-24742
Aliases
Published
2026-02-02T08:42:31.943Z
Modified
2026-02-02T09:26:09.283842Z
Summary
Discourse staff action logs expose sensitive information to moderators
Details

Discourse is an open source discussion platform. In versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0, non-admin moderators can view sensitive information in staff action logs that should be restricted to administrators only. The exposed information includes webhook payload URLs and secrets, API key details, site setting changes, private message content, restricted category names and structures, and private chat channel titles. This allows moderators to bypass intended access controls and extract confidential data by monitoring the staff action logs. With leaked webhook secrets, an attacker could potentially spoof webhook events to integrated services. This issue is patched in versions 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0. As a workaround, site administrators should review and limit moderator appointments to fully trusted users. There is no configuration-based workaround to prevent this access.

Database specific
{
    "cpes": [
        "cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:*"
    ],
    "severity": "Medium"
}
References

Affected packages

Bitnami / discourse

Package

Name
discourse
Purl
pkg:bitnami/discourse

Severity

  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.5.4
Introduced
2025.11.0
Fixed
2025.11.2
Introduced
2025.12.0
Fixed
2025.12.1
Introduced
2026.1.0
Fixed
2026.1.0

Database specific

source
"https://github.com/bitnami/vulndb/tree/main/data/discourse/BIT-discourse-2026-24742.json"