Discourse has check revision visibility on posts endpoint
Description
Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, requesting /posts/:id.json?version=X bypassed authorization checks on post revisions. The display_post method called post.revert_to directly without verifying whether the revision was hidden or if the user had permission to view edit history. This meant hidden revisions (intentionally concealed by staff) could be read by any user by simply enumerating version numbers. Starting in versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, Discourse looks up the PostRevision and call guardian.ensure_can_see! before reverting, consistent with how the /posts/:id/revisions/:revision endpoint already authorizes access. No known workarounds are available.
Affected products
1- Range: >= 2026.1.0-latest, < 2026.1.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/discourse/discourse/commit/8510fde30eb0d7f2dee822a95f6cf43b9ac943d0mitrex_refsource_MISC
- github.com/discourse/discourse/commit/c0eeb5892f5d61ad62b057f4d468333a6e9f28c3mitrex_refsource_MISC
- github.com/discourse/discourse/commit/c474fbd79d2bd231baafb4332970297d781f92camitrex_refsource_MISC
- github.com/discourse/discourse/security/advisories/GHSA-fq69-f929-wp96mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.