Denial of Service Vulnerability in Discourse by Open Source Community
CVE-2024-53851

4.3MEDIUM

Key Information:

Vendor
Discourse
Status
Vendor
CVE Published:
4 February 2025

Summary

Discourse, an open-source community discussion platform, suffers from a denial of service vulnerability due to improper URL limit enforcement in its inline onebox generation feature. Authenticated users can exploit this by sending excessive URL requests, potentially leading to service disruption. This issue has been mitigated in the latest stable, beta, and tests-passed releases of Discourse. Users unable to upgrade should disable the inline onebox feature for all domains and clear the allowed inline onebox domains to safeguard against this vulnerability.

Affected Version(s)

discourse stable: <= 3.3.2 <= stable: 3.3.2

discourse beta: <= 3.4.0.beta3 <= beta: 3.4.0.beta3

discourse tests-passed: <= 3.4.0.beta3 <= tests-passed: 3.4.0.beta3

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.