CVE-2026-26078
Plain English Summary
AI-powered analysis for quick understanding
An attacker can send fake webhook messages to a Discourse site, allowing them to create, change, or delete Patreon pledge data if the site's webhook secret is left blank. To prevent this, it's crucial to set a strong, non-empty webhook secret in the site settings.
Technical Description
Discourse is an open source discussion platform. Prior to versions 2025.12.2, 2026.1.1, and 2026.2.0, when the `patreon_webhook_secret` site setting is blank, an attacker can forge valid webhook signatures by computing an HMAC-MD5 with an empty string as the key. Since the request body is known to the sender, the attacker can produce a matching signature and send arbitrary webhook payloads. This allows unauthorized creation, modification, or deletion of Patreon pledge data and triggering patron-to-group synchronization. This vulnerability is patched in versions 2025.12.2, 2026.1.1, and 2026.2.0. The fix rejects webhook requests when the webhook secret is not configured, preventing signature forgery with an empty key. As a workaround, configure the `patreon_webhook_secret` site setting with a strong, non-empty secret value. When the secret is non-empty, an attacker cannot forge valid signatures without knowing the secret.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 26, 2026
about 1 month ago
Last Modified
Mar 2, 2026
about 1 month ago
Vendor
discourse
Product
discourse
Related Vulnerabilities
This vulnerability allows an attacker to access private user information, such as phone numbers and addresses, from all users in a Discourse forum, even if they are not logged in. It occurs because the system does not properly check permissions for certain user data fields, making it easy for anyone to exploit this flaw and collect sensitive information.
This vulnerability allows any authenticated user to manipulate policies on posts they shouldn't be able to access, including private posts, and to discover which posts have policies based on error messages. It affects users of the discourse platform who have the `discourse-policy` plugin enabled and can be fixed by upgrading to the latest versions or disabling the plugin altogether.
This vulnerability allows attackers to send fake data to certain email service integrations on the Discourse platform, which can lead to legitimate user emails being mistakenly marked as undeliverable. It occurs when no authentication token is set up, meaning attackers can exploit this weakness without needing any special access.