Discourse is an open source platform for community discussion. In affected versions an attacker can trick a target user to make changes to their own username via carefully crafted link using the `activate-account` route. This problem has been patched in the latest version of Discourse. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
References
History
Tue, 11 Feb 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 04 Feb 2025 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Discourse is an open source platform for community discussion. In affected versions an attacker can trick a target user to make changes to their own username via carefully crafted link using the `activate-account` route. This problem has been patched in the latest version of Discourse. Users are advised to upgrade. There are no known workarounds for this vulnerability. | |
Title | Client Side Path Traversal using activate account route in Discourse | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-02-04T20:53:11.983Z
Updated: 2025-02-11T21:32:19.520Z
Reserved: 2025-01-07T15:07:26.775Z
Link: CVE-2025-22601

Updated: 2025-02-11T21:32:14.241Z

Status : Received
Published: 2025-02-04T21:15:27.800
Modified: 2025-02-04T21:15:27.800
Link: CVE-2025-22601

No data.