Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-33355 | 6.5 MEDIUM | Discourse filters whisper posts from private-posts feed |
| CVE-2026-33410 | 5.4 MEDIUM | Discourse hardens chat DM channel creation and expansion |
| CVE-2026-27454 | 5.3 MEDIUM | Discourse has check revision visibility on posts endpoint |
| CVE-2026-33395 | 4.4 MEDIUM | Discourse has stored click‑based XSS via Graphviz SVG javascript: links |
| CVE-2026-32099 | 4.3 MEDIUM | Discourse prevents hidden profile data leak via user onebox |
| CVE-2026-33393 | 4.3 MEDIUM | Discourse fixes loose hostname matching in spam host allowlist |
| CVE-2026-27166 | 4.1 MEDIUM | Discourse vulnerable to HTML injection via prohibited iframe URLs |
| CVE-2026-33394 | 2.7 LOW | Discourse leaks PM post edits to moderators |
| CVE-2026-33408 | 2.2 LOW | Discourse has Improper Authorization in "Post Edits" Report For Moderators |
| CVE-2026-27570 | Discourse Vulnerable to Stored XSS via Shared AI Conversation Onebox | |
| CVE-2026-27740 | Discourse has Stored XSS in AI Triage Automation | |
| CVE-2026-27934 | Discourse leaks private topic title and post excerpt via user action API endpoint | |
| CVE-2026-27935 | Discourse leaks private topic metadata to non-authorized users | |
| CVE-2026-27936 | Discourse discloses restricted post-action counts to non-privileged users | |
| CVE-2026-29072 | Discourse missing permission check for policy creation in discourse-policy | |
| CVE-2026-28282 | Discourse vulnerable to group membership addition permission bypass via discourse-policy p |
No comments yet