CVE-2026-32619
Received Received - Intake
Unauthorized Poll Interaction Vulnerability in Discourse Platform

Publication date: 2026-03-31

Last updated on: 2026-04-09

Assigner: GitHub, Inc.

Description
Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, users who lost access to a topic (e.g., removed from a private category group) could still interact with polls in that topic, including voting and toggling poll status. No content was exposed, but users could modify poll state in topics they should no longer have access to. This issue has been patched in versions 2026.1.3, 2026.2.2, and 2026.3.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-31
Last Modified
2026-04-09
Generated
2026-05-07
AI Q&A
2026-03-31
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 4 associated CPEs
Vendor Product Version / Range
discourse discourse 2026.3.0
discourse discourse From 2026.1.0 (inc) to 2026.1.3 (exc)
discourse discourse From 2026.2.0 (inc) to 2026.2.2 (exc)
discourse discourse 2026.3.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-285 The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects the Discourse discussion platform in certain versions before they were patched. It occurs because users who have lost access to a topic, such as being removed from a private category group, could still interact with polls within that topic. Specifically, these unauthorized users could vote in polls and change poll statuses even though they should no longer have access to that topic.

No actual topic content was exposed through this vulnerability, but the ability to modify poll states represents unauthorized manipulation of the platform.

The issue was fixed by adding checks to ensure that users can only interact with polls if they still have visibility of the topic.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing users who should no longer have access to certain private topics to still influence poll results within those topics. They could vote or toggle poll statuses, which could distort poll outcomes and affect decision-making or community feedback processes.

While no confidential content is exposed, the unauthorized manipulation of poll states could undermine trust in the integrity of polls and the platform's access controls.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves unauthorized users interacting with polls in topics they no longer have access to, such as voting or toggling poll status. Detection would involve monitoring for poll interactions by users who have lost access to the associated private categories or topics.

Since the issue is related to insufficient topic visibility checks in the DiscoursePoll plugin, detection could include reviewing application logs or API request logs for poll interactions by users who should not have access.

No specific commands are provided in the available resources, but suggested approaches include:

  • Querying Discourse database or logs for poll votes or status changes made by users removed from private category groups.
  • Using Discourse API logs to identify poll toggle or vote actions by users without current access to the topic.
  • Implementing custom scripts or queries to cross-reference user group memberships with poll interactions.

What immediate steps should I take to mitigate this vulnerability?

The primary and recommended mitigation is to upgrade Discourse to one of the patched versions where this vulnerability is fixed.

  • Upgrade to Discourse version 2026.1.3 or later in the 2026.1.x series.
  • Upgrade to Discourse version 2026.2.2 or later in the 2026.2.x series.
  • Upgrade to Discourse version 2026.3.0 or later.

These updates include a fix that enforces topic visibility checks before allowing poll interactions, preventing unauthorized users from modifying poll states.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows users who have lost access to a topic to still interact with polls within that topic, including voting and toggling poll status, without exposing any content.

Although no content exposure occurred, the unauthorized ability to modify poll states in restricted topics represents a form of unauthorized manipulation.

There is no direct information in the provided context or resources about how this vulnerability impacts compliance with common standards and regulations such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart