Vulnerability Description
Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, the `allowed_spam_host_domains` check used `String#end_with?` without domain boundary validation, allowing domains like `attacker-example.com` to bypass spam protection when `example.com` was allowlisted. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 require exact match or proper subdomain match (preceded by `.`) to prevent suffix-based bypass of `newuser_spam_host_threshold`. No known workarounds are available.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Discourse | Discourse | >= 2026.1.0, < 2026.1.2 |
Related Weaknesses (CWE)
References
- https://github.com/discourse/discourse/commit/80b19c15fe9c7bc890d1a54f454c844631Patch
- https://github.com/discourse/discourse/commit/d8467b9fbb3d9ed6047b4e508d3fef88a3Patch
- https://github.com/discourse/discourse/commit/f99099cfbc6b76fe39d6fa2daa48efd694Patch
- https://github.com/discourse/discourse/security/advisories/GHSA-95r5-p6qr-hgw6Vendor Advisory
FAQ
What is CVE-2026-33393?
CVE-2026-33393 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, the `allowed_spam_host_domains` check used `String#end_with?` without domain boundary vali...
How severe is CVE-2026-33393?
CVE-2026-33393 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-33393?
Check the references section above for vendor advisories and patch information. Affected products include: Discourse Discourse.