Unrated severityNVD Advisory· Published Mar 20, 2026· Updated Mar 20, 2026
Discourse has a poll authorization bypass via post_id array parameter
CVE-2026-31805
Description
Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, an authorization bypass in the poll plugin allowed authenticated users to vote on, remove votes from, or toggle the open/closed status of polls they did not have access to. By passing post_id as an array (e.g. post_id[]=&post_id[]=), the authorization check resolves to the accessible post while the poll lookup resolves to a different post's poll. This affects the vote, remove_vote, and toggle_status endpoints in DiscoursePoll::PollsController. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch.
Affected products
1- Range: >= 2026.1.0-latest, < 2026.1.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/discourse/discourse/commit/1a6b3cdd8939053f485a60a6ea004a40878392c4mitrex_refsource_MISC
- github.com/discourse/discourse/security/advisories/GHSA-fgxm-prjv-g823mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.