Vulnerability Description
Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, an attacker with the ability to create shared AI conversations could inject arbitrary HTML and JavaScript via crafted conversation titles. This payload would execute in the browser of any user viewing the onebox preview, potentially allowing session hijacking or unauthorized actions on behalf of the victim. This issue has been patched in versions 2026.1.3, 2026.2.2, and 2026.3.0.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Discourse | Discourse | >= 2026.1.0, < 2026.1.3 |
Related Weaknesses (CWE)
References
- https://github.com/discourse/discourse/commit/cac7d618a562ce934f8dbf73cdb70066a4Patch
- https://github.com/discourse/discourse/security/advisories/GHSA-pjc5-8x3w-rfwxVendor Advisory
FAQ
What is CVE-2026-32243?
CVE-2026-32243 is a vulnerability with a CVSS score of 5.4 (MEDIUM). Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, an attacker with the abil...
How severe is CVE-2026-32243?
CVE-2026-32243 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-32243?
Check the references section above for vendor advisories and patch information. Affected products include: Discourse Discourse.