Discourse is an open source platform for community discussion. An attacker can make several XHR requests until the cache is poisoned with a response without any preloaded data. This issue only affects anonymous visitors of the site. This problem has been patched in the latest version of Discourse. Users are advised to upgrade. Users unable to upgrade should disable anonymous cache by setting the `DISCOURSE_DISABLE_ANON_CACHE` environment variable to a non-empty value.
References
Link | Resource |
---|---|
https://github.com/discourse/discourse/security/advisories/GHSA-58vv-9j8h-hw2v | Third Party Advisory |
Configurations
History
26 Aug 2025, 16:58
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/discourse/discourse/security/advisories/GHSA-58vv-9j8h-hw2v - Third Party Advisory | |
First Time |
Discourse discourse
Discourse |
|
CPE | cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:* |
10 Oct 2024, 12:56
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
08 Oct 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-08 18:15
Updated : 2025-08-26 16:58
NVD link : CVE-2024-47773
Mitre link : CVE-2024-47773
CVE.ORG link : CVE-2024-47773
JSON object : View
Products Affected
discourse
- discourse
CWE
CWE-610
Externally Controlled Reference to a Resource in Another Sphere