Vulnerability Description
Discourse is an open source platform for community discussion. New chat messages can be read by making an unauthenticated POST request to MessageBus. This issue is patched in the 3.1.1 stable and 3.2.0.beta2 versions of Discourse. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Discourse | Discourse | <= 3.1.1 |
Related Weaknesses (CWE)
References
- https://github.com/discourse/discourse/security/advisories/GHSA-84gf-hhrc-9pw6Vendor Advisory
- https://github.com/discourse/discourse/security/advisories/GHSA-84gf-hhrc-9pw6Vendor Advisory
FAQ
What is CVE-2023-45131?
CVE-2023-45131 is a vulnerability with a CVSS score of 7.5 (HIGH). Discourse is an open source platform for community discussion. New chat messages can be read by making an unauthenticated POST request to MessageBus. This issue is patched in the 3.1.1 stable and 3.2....
How severe is CVE-2023-45131?
CVE-2023-45131 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-45131?
Check the references section above for vendor advisories and patch information. Affected products include: Discourse Discourse.