
Cloud Vulnerability DB
A community-led vulnerabilities database
Discourse, an open-source discussion platform, contains a vulnerability (CVE-2025-32376) that affects versions prior to 3.4.3 on the stable branch and 3.5.0.beta3 on the beta branch. The vulnerability allows bypassing the users limit for Direct Messages (DMs), potentially enabling the creation of DMs with every user from a site (GitHub Advisory, NVD).
The vulnerability has been assigned a CVSS v4.0 base score of 4.8 (MEDIUM) with the vector string CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L. The vulnerability is classified under CWE-284 (Improper Access Control). The issue requires low attack complexity and can be exploited over the network, though it requires low privileges and active user interaction (NVD, Wiz).
The primary impact of this vulnerability is the potential to bypass DM user limits, allowing an attacker to create direct messages that include all users on a site. This could lead to availability issues in the system, though there are no direct confidentiality or integrity impacts (GitHub Advisory).
The vulnerability has been patched in stable version 3.4.3 and beta version 3.5.0.beta3. Users are advised to upgrade to these or later versions. No workarounds are available for this vulnerability (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."