
Cloud Vulnerability DB
A community-led vulnerabilities database
Discourse, an open-source discussion platform, was affected by a cross-site scripting (XSS) vulnerability identified as CVE-2023-25172. The vulnerability was discovered in versions prior to 3.0.1 of the 'stable' branch and version 3.1.0.beta2 of the 'beta' and 'tests-passed' branches. A maliciously crafted URL could be included in a user's full name field to carry out cross-site scripting attacks on sites with a disabled or overly permissive Content Security Policy (CSP) (GitHub Advisory).
The vulnerability is classified as a medium severity issue with a CVSS v3.1 base score of 5.4 (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N). The vulnerability specifically affects the way URLs are handled in the user's full name field, allowing potential XSS attacks when CSP protections are not properly configured. It's worth noting that Discourse's default CSP configuration prevents this vulnerability from being exploited (NVD).
The vulnerability could allow attackers to execute malicious JavaScript code in the context of other users' browsers when they view content containing the crafted URL in the user's full name. This could potentially lead to session hijacking or other client-side attacks on sites where CSP is disabled or misconfigured (GitHub Advisory).
The vulnerability has been patched in version 3.0.1 of the 'stable' branch and version 3.1.0.beta2 of the 'beta' and 'tests-passed' branches. For users unable to immediately update, the recommended workaround is to enable and/or restore the site's CSP to the default configuration provided with Discourse (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."