{"id":"BIT-discourse-2026-32607","summary":"Discourse: Stored XSS via unescaped assignee name","details":"Discourse is an open-source discussion platform. From versions 2026.1.0 to before 2026.1.3, and 2026.2.0 to before 2026.2.2, when the hidden prioritize_full_name_in_ux site setting is enabled (defaults to false, requires console access to change), user and group display names are rendered without HTML escaping in several assignment-related UI paths. This allows users with assign permission to inject arbitrary HTML/JavaScript that executes in the browser of any user viewing an affected topic. This issue has been patched in versions 2026.1.3, 2026.2.2, and 2026.3.0.","aliases":["CVE-2026-32607","GHSA-xg68-q7ff-6gqm"],"modified":"2026-04-07T09:41:03.376144325Z","published":"2026-04-07T08:43:50.897Z","database_specific":{"severity":"Low","cpes":["cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:*"]},"references":[{"type":"WEB","url":"https://github.com/discourse/discourse/commit/46edb174e237c6e57bda9c494160da0a174fe70d"},{"type":"WEB","url":"https://github.com/discourse/discourse/security/advisories/GHSA-xg68-q7ff-6gqm"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-32607"}],"affected":[{"package":{"name":"discourse","ecosystem":"Bitnami","purl":"pkg:bitnami/discourse"},"ranges":[{"type":"SEMVER","events":[{"introduced":"2026.1.0"},{"fixed":"2026.1.3"},{"introduced":"2026.2.0"},{"fixed":"2026.2.2"}]}],"database_specific":{"source":"https://github.com/bitnami/vulndb/tree/main/data/discourse/BIT-discourse-2026-32607.json"},"severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"}]}],"schema_version":"1.7.5"}