Discourse Vulnerabilities

Comprehensive security vulnerability database for Discourse products

Last updated: Feb 26, 2026
Total CVEs

4

Critical

0

With Exploits

2

Last 30 Days

0

Severity Distribution

Critical0
0%
High2
50%
Medium2
50%
Low0
0%
DescriptionVendor / ProductExploit Status
CVE-2026-262657.5

This vulnerability allows an attacker to access private user information, such as phone numbers and addresses, from all users in a Discourse forum, even if they are not logged in. It occurs because the system does not properly check permissions for certain user data fields, making it easy for anyone to exploit this flaw and collect sensitive information.

discoursediscourse
Exploit Available
about 1 month agoFeb 26, 2026
CVE-2026-262075.4

This vulnerability allows any authenticated user to manipulate policies on posts they shouldn't be able to access, including private posts, and to discover which posts have policies based on error messages. It affects users of the discourse platform who have the `discourse-policy` plugin enabled and can be fixed by upgrading to the latest versions or disabling the plugin altogether.

discoursediscourse
Exploit Available
about 1 month agoFeb 26, 2026
CVE-2026-260787.5

An attacker can send fake webhook messages to a Discourse site, allowing them to create, change, or delete Patreon pledge data if the site's webhook secret is left blank. To prevent this, it's crucial to set a strong, non-empty webhook secret in the site settings.

discoursediscourse
Theoretical
about 1 month agoFeb 26, 2026
CVE-2026-260776.5

This vulnerability allows attackers to send fake data to certain email service integrations on the Discourse platform, which can lead to legitimate user emails being mistakenly marked as undeliverable. It occurs when no authentication token is set up, meaning attackers can exploit this weakness without needing any special access.

discoursediscourse
Theoretical
about 1 month agoFeb 26, 2026

About Discourse Security

This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Discourse products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.

Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.