Home

Description

Discourse is an open source platform for community discussion. In affected versions an attacker can trick a target user to make changes to their own username via carefully crafted link using the `activate-account` route. This problem has been patched in the latest version of Discourse. Users are advised to upgrade. There are no known workarounds for this vulnerability.

PUBLISHED Reserved 2025-01-07 | Published 2025-02-04 | Updated 2025-02-11 | Assigner GitHub_M




LOW: 3.1CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

beta: <= 3.4.0.beta3
affected

tests-passed: <= 3.4.0.beta3
affected

References

github.com/...course/security/advisories/GHSA-gvpp-v7mp-wxxw

cve.org (CVE-2025-22601)

nvd.nist.gov (CVE-2025-22601)

Download JSON