Vulnerability Description
Discourse is an open-source discussion platform. Between versions 3.1.0.beta2 and 3.1.0.beta3 of the `tests-passed` branch, editing or responding to a chat message containing malicious content could lead to a cross-site scripting attack. This issue is patched in version 3.1.0.beta3 of the `tests-passed` branch. There are no known workarounds.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Discourse | Discourse | 3.1.0 |
Related Weaknesses (CWE)
References
- https://github.com/discourse/discourse/commit/a373bf2a01488c206e7feb28a9d2361b22Patch
- https://github.com/discourse/discourse/security/advisories/GHSA-ccfc-qpmp-gq87Vendor Advisory
- https://github.com/discourse/discourse/commit/a373bf2a01488c206e7feb28a9d2361b22Patch
- https://github.com/discourse/discourse/security/advisories/GHSA-ccfc-qpmp-gq87Vendor Advisory
FAQ
What is CVE-2023-26040?
CVE-2023-26040 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Discourse is an open-source discussion platform. Between versions 3.1.0.beta2 and 3.1.0.beta3 of the `tests-passed` branch, editing or responding to a chat message containing malicious content could l...
How severe is CVE-2023-26040?
CVE-2023-26040 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-26040?
Check the references section above for vendor advisories and patch information. Affected products include: Discourse Discourse.