CVE-2026-27491 PUBLISHED

Discourse has a bypass of official warnings messages by non-staff users

Assigner: GitHub_M
Reserved: 19.02.2026 Published: 19.03.2026 Updated: 19.03.2026

Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, a type coercion issue in a post actions API endpoint allowed non-staff users to issue warnings to other users. Warnings are a staff-only moderation feature. The vulnerability required the attacker to be a logged-in user and to send a specifically crafted request. No data exposure or privilege escalation beyond the ability to create unauthorized user warnings was possible. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. No known workarounds are available.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
CVSS Score: 6.9

Product Status

Vendor discourse
Product discourse
Versions
  • Version >= 2026.1.0-latest, < 2026.1.2 is affected
  • Version >= 2026.2.0-latest, < 2026.2.1 is affected
  • Version = 2026.3.0-latest is affected

References

Problem Types

  • CWE-862: Missing Authorization CWE