Discourse is an open source platform for community discussion. In affected versions an attacker can trick a target user to make changes to their own username via carefully crafted link using the `activate-account` route. This problem has been patched in the latest version of Discourse. Users are advised to upgrade. There are no known workarounds for this vulnerability.
History

Tue, 11 Feb 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 04 Feb 2025 21:00:00 +0000

Type Values Removed Values Added
Description Discourse is an open source platform for community discussion. In affected versions an attacker can trick a target user to make changes to their own username via carefully crafted link using the `activate-account` route. This problem has been patched in the latest version of Discourse. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Title Client Side Path Traversal using activate account route in Discourse
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 3.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-02-04T20:53:11.983Z

Updated: 2025-02-11T21:32:19.520Z

Reserved: 2025-01-07T15:07:26.775Z

Link: CVE-2025-22601

cve-icon Vulnrichment

Updated: 2025-02-11T21:32:14.241Z

cve-icon NVD

Status : Received

Published: 2025-02-04T21:15:27.800

Modified: 2025-02-04T21:15:27.800

Link: CVE-2025-22601

cve-icon Redhat

No data.