CVE-2024-47773

Discourse is an open source platform for community discussion. An attacker can make several XHR requests until the cache is poisoned with a response without any preloaded data. This issue only affects anonymous visitors of the site. This problem has been patched in the latest version of Discourse. Users are advised to upgrade. Users unable to upgrade should disable anonymous cache by setting the `DISCOURSE_DISABLE_ANON_CACHE` environment variable to a non-empty value.
Configurations

Configuration 1 (hide)

cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:*

History

26 Aug 2025, 16:58

Type Values Removed Values Added
CPE cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:*
References () https://github.com/discourse/discourse/security/advisories/GHSA-58vv-9j8h-hw2v - () https://github.com/discourse/discourse/security/advisories/GHSA-58vv-9j8h-hw2v - Third Party Advisory
First Time Discourse
Discourse discourse

Information

Published : 2024-10-08 18:15

Updated : 2025-08-26 16:58


NVD link : CVE-2024-47773

Mitre link : CVE-2024-47773

CVE.ORG link : CVE-2024-47773


JSON object : View

Products Affected

discourse

  • discourse
CWE
CWE-610

Externally Controlled Reference to a Resource in Another Sphere