HomeDiscourseCVE-2025-68934

CVE-2025-68934

MEDIUM
6.5CVSS
Published: 2026-01-28
Updated: 2026-01-30
AI Analysis

Description

Discourse is an open source discussion platform. In versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0, authenticated users can submit crafted payloads to /drafts.json that cause O(n^2) processing in Base62.decode, tying up workers for 35-60 seconds per request. This affects all users as the shared worker pool becomes exhausted. This issue is patched in versions 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0. Lowering the max_draft_length site setting reduces attack surface but does not fully mitigate the issue, as payloads under the limit can still trigger the slow code path.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Attack Vector
network
Complexity
low
Privileges
low
User Action
none
Scope
unchanged
Confidentiality
none
Integrity
none
Availability
high
Weaknesses
CWE-770

Metadata

Primary Vendor
DISCOURSE
Published
1/28/2026
Last Modified
1/30/2026
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

discourse : discoursediscourse : discoursediscourse : discoursediscourse : discourse

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2025-68934 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com