Home

Description

Discourse is an open source discussion platform. Versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0 have an application level denial of service vulnerabilityin the username change functionality at try.discourse.org. The vulnerability allows attackers to cause noticeable server delays and resource exhaustion by sending large JSON payloads to the username preference endpoint PUT /u//preferences/username, resulting in degraded performance for other users and endpoints. This issue is patched in versions 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0. No known workarounds are available.

PUBLISHED Reserved 2025-12-22 | Published 2026-01-28 | Updated 2026-01-28 | Assigner GitHub_M




MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Problem types

CWE-770: Allocation of Resources Without Limits or Throttling

Product status

< 3.5.4
affected

>= 2025.11.0-latest, < 2025.11.2
affected

>= 2025.12.0-latest, < 2025.12.1
affected

>= 2026.1.0-latest, < 2026.1.0
affected

References

github.com/...course/security/advisories/GHSA-rmp6-c9rq-6q7p

cve.org (CVE-2025-68659)

nvd.nist.gov (CVE-2025-68659)

Download JSON