Vulnerability Description
Discourse is an option source discussion platform. Prior to version 2.8.14 on the `stable` branch and version 3.0.0.beta16 on the `beta` and `tests-passed` branches, the number of times a user posted in an arbitrary topic is exposed to unauthorized users through the `/u/username.json` endpoint. The issue is patched in version 2.8.14 and 3.0.0.beta16. There is no known workaround.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Discourse | Discourse | < 2.8.14 |
Related Weaknesses (CWE)
References
- https://github.com/discourse/discourse/commit/cbcf8a064b4889a19c991641e09c399bfaPatchThird Party Advisory
- https://github.com/discourse/discourse/security/advisories/GHSA-xx97-6494-p2rvThird Party Advisory
- https://github.com/discourse/discourse/commit/cbcf8a064b4889a19c991641e09c399bfaPatchThird Party Advisory
- https://github.com/discourse/discourse/security/advisories/GHSA-xx97-6494-p2rvThird Party Advisory
FAQ
What is CVE-2023-22453?
CVE-2023-22453 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Discourse is an option source discussion platform. Prior to version 2.8.14 on the `stable` branch and version 3.0.0.beta16 on the `beta` and `tests-passed` branches, the number of times a user posted ...
How severe is CVE-2023-22453?
CVE-2023-22453 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-22453?
Check the references section above for vendor advisories and patch information. Affected products include: Discourse Discourse.