CVE-2026-33393
EUVD-2026-1333819.03.2026, 22:16
Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, the `allowed_spam_host_domains` check used `String#end_with?` without domain boundary validation, allowing domains like `attacker-example.com` to bypass spam protection when `example.com` was allowlisted. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 require exact match or proper subdomain match (preceded by `.`) to prevent suffix-based bypass of `newuser_spam_host_threshold`. No known workarounds are available.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| discourse | discourse | 2026.1.0 ≤ 𝑥 < 2026.1.2 |
| discourse | discourse | 2026.2.0 ≤ 𝑥 < 2026.2.1 |
| discourse | discourse | 2026.3.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References