Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2025-68662 | 7.6 HIGH | FinalDestination hostname matching allows SSRF protection bypass |
| CVE-2025-68479 | 7.1 HIGH | Discourse subscriptions are susceptible to takeover |
| CVE-2025-68933 | 6.9 MEDIUM | Discourse non-admin moderators can exfiltrate private content via post ownership transfer |
| CVE-2026-24742 | 6.5 MEDIUM | Discourse staff action logs expose sensitive information to moderators |
| CVE-2026-21865 | 6.5 MEDIUM | Discourse topic conversion permission vulnerability for moderators |
| CVE-2025-68934 | 6.5 MEDIUM | Discourse Has Denial of Service (DoS) Vulnerability in Drafts Creation Endpoint |
| CVE-2025-67723 | 4.6 MEDIUM | Discourse vulnerable to stored Cross-site Scripting via Katex in discourse-math plugin |
| CVE-2025-66488 | 4.6 MEDIUM | Discourse allows script execution in uploaded HTML/XML files on S3 |
| CVE-2025-68659 | 4.3 MEDIUM | Discourse has DoS vulnerability in username change endpoint |
| CVE-2026-23743 | Discourse allows permalinks to restricted resources to leak resource slugs to unauthorized | |
| CVE-2025-69218 | Discourse moderators can access admin-only reports exposing private upload URLs | |
| CVE-2025-68666 | Discourse users archives leaked to users with moderation privileges | |
| CVE-2025-68660 | Discourse AI Discover's continue conversation allows threat actor to impersonate user |
No comments yet