Discourse is an open source discussion platform. Prior to versions 2025.12.2, 2026.1.1, and 2026.2.0, a user full name can be evaluated as raw HTML when the following settings are set: `display_name_on_posts` => true; and `prioritize_username_in_ux` => false. Editing a post of a malicious user would trigger an XSS. Versions 2025.12.2, 2026.1.1, and 2026.2.0 patch the issue. No known workarounds are available.
References
| Link | Resource |
|---|---|
| https://github.com/discourse/discourse/security/advisories/GHSA-xv43-5gcp-wgw8 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-02-26 22:20
Updated : 2026-03-02 18:13
NVD link : CVE-2026-27154
Mitre link : CVE-2026-27154
CVE.ORG link : CVE-2026-27154
JSON object : View
Products Affected
discourse
- discourse
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
