Unrated severityNVD Advisory· Published Mar 19, 2026· Updated Mar 20, 2026
Discourse fixes loose hostname matching in spam host allowlist
CVE-2026-33393
Description
Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, the allowed_spam_host_domains check used String#end_with? without domain boundary validation, allowing domains like attacker-example.com to bypass spam protection when example.com was allowlisted. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 require exact match or proper subdomain match (preceded by .) to prevent suffix-based bypass of newuser_spam_host_threshold. No known workarounds are available.
Affected products
1- Range: >= 2026.1.0-latest, < 2026.1.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/discourse/discourse/commit/80b19c15fe9c7bc890d1a54f454c8446312ac6d2mitrex_refsource_MISC
- github.com/discourse/discourse/commit/d8467b9fbb3d9ed6047b4e508d3fef88a37b8a02mitrex_refsource_MISC
- github.com/discourse/discourse/commit/f99099cfbc6b76fe39d6fa2daa48efd69497fb8emitrex_refsource_MISC
- github.com/discourse/discourse/security/advisories/GHSA-95r5-p6qr-hgw6mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.