5.4 CVE-2025-54411
Discourse is an open-source discussion platform. Welcome banner user name string for logged in users can be vulnerable to XSS attacks, which affect the user themselves or an admin impersonating them. Admins can temporarily alter the welcome_banner.header.logged_in_members site text to remove the preferred_display_name placeholder, or not impersonate
any users for the time being. This vulnerability is fixed in 3.5.0.beta8.
https://nvd.nist.gov/vuln/detail/CVE-2025-54411
Categories
CWE-79
References
security-advisories@github.com Patch
CPE
| cpe |
start |
end |
| Configuration 1 |
| cpe:2.3:a:discourse:discourse:*:*:*:*:beta:*:*:* |
|
< 3.5.0 |
| cpe:2.3:a:discourse:discourse:3.5.0:beta1:*:*:beta:*:*:* |
|
|
| cpe:2.3:a:discourse:discourse:3.5.0:beta2:*:*:beta:*:*:* |
|
|
| cpe:2.3:a:discourse:discourse:3.5.0:beta3:*:*:beta:*:*:* |
|
|
| cpe:2.3:a:discourse:discourse:3.5.0:beta4:*:*:beta:*:*:* |
|
|
| cpe:2.3:a:discourse:discourse:3.5.0:beta5:*:*:beta:*:*:* |
|
|
| cpe:2.3:a:discourse:discourse:3.5.0:beta6:*:*:beta:*:*:* |
|
|
| cpe:2.3:a:discourse:discourse:3.5.0:beta7:*:*:beta:*:*:* |
|
|
REMEDIATION
Patch
EXPLOITS
Exploit-db.com
| id |
description |
date |
|
| No known exploits |
POC Github
Other Nist (github, ...)
CAPEC
Common Attack Pattern Enumerations and Classifications
| id |
description |
severity |
| No entry |
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.
Discover this offer