Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-32273 | 5.4 MEDIUM | Discourse: XSS on category description update via API |
| CVE-2026-32618 | 4.3 MEDIUM | Discourse: Unauthorized channel membership inference via excluded_memberships_channel_id |
| CVE-2026-32951 | 4.3 MEDIUM | Discourse: Authorization bypass in oneboxer via user-controlled category id |
| CVE-2026-32607 | Discourse: Stored XSS via unescaped assignee name | |
| CVE-2026-32620 | Discourse: Missing post-level authorization allows whisper metadata disclosure | |
| CVE-2026-32619 | Discourse: Insufficient topic visibility check allows unauthorized poll manipulation in pr | |
| CVE-2026-32243 | Discourse: Stored XSS in discourse-ai shared conversations onebox | |
| CVE-2026-32615 | Discourse: Category group moderators can perform actions on topics in restricted categorie | |
| CVE-2026-32143 | Discourse: Admin-only report can be exported by moderators | |
| CVE-2026-33074 | Discourse: Vulnerability in discourse-subscriptions plugin allowing users to self-grant to | |
| CVE-2026-33073 | discourse-subscriptions plugin leaking stripe API key in multisite environment | |
| CVE-2026-33415 | Discourse: Improper Access Control in discourse-ai Allows Unauthorized Category Content Ex | |
| CVE-2026-33300 | Discourse: Hidden group names and access metadata are exposed to moderators through the `c | |
| CVE-2026-33185 | Discourse: Group SMTP test endpoint susceptible to SSRF |
No comments yet