CVE-2026-32113
Description
Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, the enter action in StaticController reads the sso_destination_url cookie and redirects to it with allow_other_host: true without validating the destination URL. While this cookie is normally set during legitimate DiscourseConnect Provider flows with cryptographically validated SSO payloads, cookies are client-controlled and can be set by attackers. This issue has been patched in versions 2026.1.3, 2026.2.2, and 2026.3.0.
Affected products
3cpe:2.3:a:discourse:discourse:2026.3.0:*:*:*:latest:*:*:*+ 2 more
- cpe:2.3:a:discourse:discourse:2026.3.0:*:*:*:latest:*:*:*
- cpe:2.3:a:discourse:discourse:2026.3.0:*:*:*:latest.1:*:*:*
- cpe:2.3:a:discourse:discourse:*:*:*:*:latest:*:*:*range: >=2026.1.0,<2026.1.3
Patches
1080408b93d00Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4- github.com/discourse/discourse/commit/080408b93d00305b51d71f63f755f43fa601884dnvdPatch
- github.com/discourse/discourse/security/advisories/GHSA-378j-ccw4-4fwhnvdMitigationVendor Advisory
- meta.discourse.org/t/use-discourse-as-an-identity-provider-sso-discourseconnect/32974nvdProduct
- meta.discourse.org/t/using-discourse-as-a-sso-provider/32974nvdProduct
News mentions
0No linked articles in our index yet.