FKIE_CVE-2025-68933
Vulnerability from fkie_nvd - Published: 2026-01-28 20:16 - Updated: 2026-01-30 20:47
Severity ?
6.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Summary
Discourse is an open source discussion platform. In versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0, non-admin moderators with the `moderators_change_post_ownership` setting enabled can change ownership of posts in private messages and restricted categories they cannot access, then export their data to view the content. This is a broken access control vulnerability affecting sites that grant moderators post ownership transfer permissions. This issue is patched in versions 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0. The patch adds visibility checks for both the topic and posts before allowing ownership transfer. As a workaround, disable the `moderators_change_post_ownership` site setting to prevent non-admin moderators from using the post ownership transfer feature.
References
| URL | Tags | ||
|---|---|---|---|
| security-advisories@github.com | https://github.com/discourse/discourse/security/advisories/GHSA-hpxv-mw7v-fqg2 | Third Party Advisory, Mitigation |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:*",
"matchCriteriaId": "FDBF21E2-1191-4020-A17A-0702DE4E6451",
"versionEndExcluding": "3.5.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:*",
"matchCriteriaId": "539B5B85-44F0-408E-B994-08BB20EA9C26",
"versionEndExcluding": "2025.11.2",
"versionStartIncluding": "2025.11.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:discourse:discourse:2025.12.0:*:*:*:stable:*:*:*",
"matchCriteriaId": "CCBF47A8-0D3F-4174-8084-CD3517BF272A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:discourse:discourse:2026.1.0:*:*:*:stable:*:*:*",
"matchCriteriaId": "F6CF5F98-F08F-4B28-BBE2-8296760A547E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Discourse is an open source discussion platform. In versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0, non-admin moderators with the `moderators_change_post_ownership` setting enabled can change ownership of posts in private messages and restricted categories they cannot access, then export their data to view the content. This is a broken access control vulnerability affecting sites that grant moderators post ownership transfer permissions. This issue is patched in versions 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0. The patch adds visibility checks for both the topic and posts before allowing ownership transfer. As a workaround, disable the `moderators_change_post_ownership` site setting to prevent non-admin moderators from using the post ownership transfer feature."
},
{
"lang": "es",
"value": "Discourse es una plataforma de discusi\u00f3n de c\u00f3digo abierto. En versiones anteriores a 3.5.4, 2025.11.2, 2025.12.1 y 2026.1.0, los moderadores no administradores con la configuraci\u00f3n \u0027moderators_change_post_ownership\u0027 habilitada pueden cambiar la propiedad de las publicaciones en mensajes privados y categor\u00edas restringidas a las que no pueden acceder, y luego exportar sus datos para ver el contenido. Esto es una vulnerabilidad de control de acceso roto que afecta a los sitios que otorgan a los moderadores permisos de transferencia de propiedad de publicaciones. Este problema est\u00e1 parcheado en las versiones 3.5.4, 2025.11.2, 2025.12.1 y 2026.1.0. El parche a\u00f1ade comprobaciones de visibilidad tanto para el tema como para las publicaciones antes de permitir la transferencia de propiedad. Como soluci\u00f3n alternativa, deshabilite la configuraci\u00f3n del sitio \u0027moderators_change_post_ownership\u0027 para evitar que los moderadores no administradores utilicen la funci\u00f3n de transferencia de propiedad de publicaciones."
}
],
"id": "CVE-2025-68933",
"lastModified": "2026-01-30T20:47:13.950",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.7,
"impactScore": 4.7,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2026-01-28T20:16:12.477",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory",
"Mitigation"
],
"url": "https://github.com/discourse/discourse/security/advisories/GHSA-hpxv-mw7v-fqg2"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-863"
}
],
"source": "security-advisories@github.com",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…