Vulnerability Description
Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, the group email settings test endpoint could be used to make the server initiate outbound connections to arbitrary hosts and ports. This could allow probing of internal network infrastructure. The endpoint was accessible to non-staff group owners. This issue has been patched in versions 2026.1.3, 2026.2.2, and 2026.3.0.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Discourse | Discourse | >= 2026.1.0, < 2026.1.3 |
Related Weaknesses (CWE)
References
- https://github.com/discourse/discourse/commit/e75cf456e8e318290c569bd6e8fa0f2586Patch
- https://github.com/discourse/discourse/security/advisories/GHSA-5976-77mj-m4h3Vendor Advisory
FAQ
What is CVE-2026-33185?
CVE-2026-33185 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, the group email settings ...
How severe is CVE-2026-33185?
CVE-2026-33185 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-33185?
Check the references section above for vendor advisories and patch information. Affected products include: Discourse Discourse.