Discourse is an open-source discussion platform. Improperly sanitized user input could lead to an XSS vulnerability in some situations. This vulnerability only affects Discourse instances which have disabled the default Content Security Policy. The vulnerability is patched in 3.1.5 and 3.2.0.beta5. As a workaround, ensure Content Security Policy is enabled and does not include `unsafe-inline`.
Metrics
Affected Vendors & Products
References
History
Thu, 17 Oct 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-10-17T17:59:10.354Z
Reserved: 2024-01-22T22:23:54.340Z
Link: CVE-2024-23834

Updated: 2024-08-01T23:13:08.045Z

Status : Modified
Published: 2024-01-30T22:15:53.307
Modified: 2024-11-21T08:58:31.477
Link: CVE-2024-23834

No data.