CVE-2026-33514
Undergoing Analysis Undergoing Analysis - In Progress
Information Disclosure in Discourse Form Templates

Publication date: 2026-05-19

Last updated on: 2026-05-19

Assigner: GitHub, Inc.

Description
Discourse is an open-source discussion platform. In versions prior to 2026.1.4, 2026.3.1, 2026.4.1 and 2026.5.0-latest.1, an authenticated user on a Discourse instance with the form templates feature enabled can read the name and structured content of form templates that are intended exclusively for categories they are not authorized to access. Impact is limited to disclosure of site configuration metadata. This issue has been fixed in versions 2026.1.4, 2026.3.1, 2026.4.1 and 2026.5.0-latest.1.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-19
Last Modified
2026-05-19
Generated
2026-05-20
AI Q&A
2026-05-19
EPSS Evaluated
2026-05-19
NVD
EUVD
Affected Vendors & Products
Showing 4 associated CPEs
Vendor Product Version / Range
discourse discourse to 2026.1.4 (exc)
discourse discourse to 2026.3.1 (exc)
discourse discourse to 2026.4.1 (exc)
discourse discourse to 2026.5.0-latest.1 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in Discourse allows an authenticated user to access the names and detailed structured content of form templates that belong to categories they are not authorized to view.

The issue arises because the endpoints handling form templates did not properly enforce category visibility restrictions, enabling unauthorized users to retrieve sensitive site configuration metadata.

The problem was fixed by scoping form template queries to only include templates from categories accessible to the user, ensuring unauthorized templates are not disclosed.


How can this vulnerability impact me? :

The impact of this vulnerability is limited to the disclosure of site configuration metadata through unauthorized access to form templates.

An attacker with valid authentication could gain insight into the structure and names of form templates intended for restricted categories, potentially revealing sensitive configuration details about the site.

However, this vulnerability does not allow modification or deletion of data, nor does it expose user personal data directly.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves unauthorized access to form templates via the `/form-templates` and `/form-templates/:id` endpoints in Discourse. Detection can focus on monitoring authenticated user requests to these endpoints to see if they are accessing form templates from categories they should not have access to.

You can detect potential exploitation by reviewing access logs for requests to `/form-templates` or `/form-templates/:id` endpoints made by users who do not have permissions for the categories associated with those templates.

Example commands to check logs (assuming typical web server logs):

  • grep "/form-templates" /var/log/nginx/access.log | less
  • grep "/form-templates/" /var/log/nginx/access.log | awk '{print $1, $7, $9}' | sort | uniq -c

Additionally, you can audit application logs or use Discourse's admin interface to review user activity related to form templates if such logging is enabled.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows an authenticated user to access the names and structured content of form templates intended for categories they are not authorized to access, resulting in disclosure of site configuration metadata.

However, the impact is limited to metadata disclosure and does not involve personal data or sensitive user information directly.

Therefore, while this could potentially raise concerns about unauthorized access to configuration data, there is no direct indication from the provided information that it leads to violations of compliance requirements such as GDPR or HIPAA, which primarily focus on personal and sensitive data protection.

Organizations should still consider the risk of metadata exposure in their overall security posture and ensure timely patching to maintain compliance with best practices.


What immediate steps should I take to mitigate this vulnerability?

The primary and recommended mitigation is to update Discourse to a fixed version where this vulnerability is patched.

  • Upgrade Discourse to version 2026.1.4, 2026.3.1, 2026.4.1, or 2026.5.0-latest.1 or later.

If immediate upgrade is not possible, consider disabling the form templates feature temporarily to prevent unauthorized access to form templates.

Review and restrict user permissions carefully to limit authenticated users' access to only necessary categories.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart