Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
4.9
Discourse Discussion Platform: Unauthorized PM Data Exposure
CVE-2026-27149
Summary
An attacker could access confidential information about private messages by exploiting a weakness in the way Discourse handles message filtering. This affects older versions of the software, and users should update to the latest patched versions to protect their data. Updating to versions 2025.12.2, 2026.1.1, or 2026.2.0 will resolve the issue.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| discourse | discourse | <= 2025.12.2 | – |
| discourse | discourse | > 2026.1.0 , <= 2026.1.1 | – |
| discourse | discourse | 2026.2.0 | – |
Original title
Discourse is an open source discussion platform. Prior to versions 2025.12.2, 2026.1.1, and 2026.2.0, SQL injection in PM tag filtering (`list_private_messages_tag`) allows bypassing tag filter con...
Original description
Discourse is an open source discussion platform. Prior to versions 2025.12.2, 2026.1.1, and 2026.2.0, SQL injection in PM tag filtering (`list_private_messages_tag`) allows bypassing tag filter conditions, potentially disclosing unauthorized private message metadata. Versions 2025.12.2, 2026.1.1, and 2026.2.0 patch the issue. No known workarounds are available.
nvd CVSS3.1
6.5
nvd CVSS4.0
4.9
Vulnerability type
CWE-89
SQL Injection
Published: 26 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026