Vulnerability Description
Discourse is an open source platform for community discussion. Improper escaping of user input allowed for Cross-site Scripting attacks via the digest email preview UI. This issue only affects sites with CSP disabled. This issue has been patched in the 3.1.1 stable release as well as the 3.2.0.beta1 release. Users are advised to upgrade. Users unable to upgrade should ensure CSP is enabled on the forum.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Discourse | Discourse | <= 3.1.1 |
Related Weaknesses (CWE)
References
- https://developer.mozilla.org/en-US/docs/Web/HTTP/CSPThird Party Advisory
- https://github.com/discourse/discourse/security/advisories/GHSA-g4qg-5q2h-m8phVendor Advisory
- https://developer.mozilla.org/en-US/docs/Web/HTTP/CSPThird Party Advisory
- https://github.com/discourse/discourse/security/advisories/GHSA-g4qg-5q2h-m8phVendor Advisory
FAQ
What is CVE-2023-43659?
CVE-2023-43659 is a vulnerability with a CVSS score of 8.0 (HIGH). Discourse is an open source platform for community discussion. Improper escaping of user input allowed for Cross-site Scripting attacks via the digest email preview UI. This issue only affects sites w...
How severe is CVE-2023-43659?
CVE-2023-43659 has been rated HIGH with a CVSS base score of 8.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-43659?
Check the references section above for vendor advisories and patch information. Affected products include: Discourse Discourse.