VYPR
Medium severity6.1NVD Advisory· Published Mar 31, 2026· Updated Apr 3, 2026

CVE-2026-32113

CVE-2026-32113

Description

Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, the enter action in StaticController reads the sso_destination_url cookie and redirects to it with allow_other_host: true without validating the destination URL. While this cookie is normally set during legitimate DiscourseConnect Provider flows with cryptographically validated SSO payloads, cookies are client-controlled and can be set by attackers. This issue has been patched in versions 2026.1.3, 2026.2.2, and 2026.3.0.

Affected products

3
  • cpe:2.3:a:discourse:discourse:2026.3.0:*:*:*:latest:*:*:*+ 2 more
    • cpe:2.3:a:discourse:discourse:2026.3.0:*:*:*:latest:*:*:*
    • cpe:2.3:a:discourse:discourse:2026.3.0:*:*:*:latest.1:*:*:*
    • cpe:2.3:a:discourse:discourse:*:*:*:*:latest:*:*:*range: >=2026.1.0,<2026.1.3

Patches

1

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

4

News mentions

0

No linked articles in our index yet.