Discourse 3.4.0 Beta 1

CPE Details

Discourse 3.4.0 Beta 1
3.4.0
2025-07-18
19h03 +00:00
2025-07-18
19h03 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:discourse:discourse:3.4.0:beta1:*:*:beta:*:*:*

Informations

Vendor

discourse

Product

discourse

Version

3.4.0

Update

beta1

Software Edition

beta

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2025-32376 2025-04-30 14h55 +00:00 Discourse is an open-source discussion platform. Prior to versions 3.4.3 on the stable branch and 3.5.0.beta3 on the beta branch, the users limit for a DM can be bypassed, thus giving the ability to potentially create a DM with every user from a site in it. This issue has been patched in stable version 3.4.3 and beta version 3.5.0.beta3.
4.8
Moyen
CVE-2024-47772 2024-10-07 20h50 +00:00 Discourse is an open source platform for community discussion. An attacker can execute arbitrary JavaScript on users' browsers by sending a maliciously crafted chat message and replying to it. This issue only affects sites with CSP disabled. This problem is patched in the latest version of Discourse. All users are advised to upgrade. Users unable to upgrade should ensure CSP is enabled on the forum. Users who do upgrade should also consider enabling a CSP as well as a proactive measure.
6.5
Moyen
CVE-2024-45297 2024-10-07 20h24 +00:00 Discourse is an open source platform for community discussion. Users can see topics with a hidden tag if they know the label/name of that tag. This issue has been patched in the latest stable, beta and tests-passed version of Discourse. All users area are advised to upgrade. There are no known workarounds for this vulnerability.
5.3
Moyen
CVE-2024-45051 2024-10-07 20h23 +00:00 Discourse is an open source platform for community discussion. A maliciously crafted email address could allow an attacker to bypass domain-based restrictions and gain access to private sites, categories and/or groups. This issue has been patched in the latest stable, beta and tests-passed version of Discourse. All users area are advised to upgrade. There are no known workarounds for this vulnerability.
8.2
Haute