Discourse Calendar
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Discourse Calendar.
By the Year
In 2026 there have been 0 vulnerabilities in Discourse Calendar. Discourse Calendar did not have any published security vulnerabilities last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 0 | 0.00 |
| 2024 | 2 | 4.80 |
| 2023 | 1 | 6.10 |
| 2022 | 2 | 5.40 |
It may take a day or so for new Discourse Calendar vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Discourse Calendar Security Vulnerabilities
Discourse Calendar plugin: Region length overflow allows DoS bandwidth & disk
CVE-2024-21658
4.3 - Medium
- August 30, 2024
discourse-calendar is a discourse plugin which adds the ability to create a dynamic calendar in the first post of a topic. The limit on region value length is too generous. This allows a malicious actor to cause a Discourse instance to use excessive bandwidth and disk space. This issue has been patched in main the main branch. There are no workarounds for this vulnerability. Please upgrade as soon as possible.
Allocation of Resources Without Limits or Throttling
Discourse Calendar: Anonymous Invitee Disclosure Pre-v0.4
CVE-2024-24817
5.3 - Medium
- February 22, 2024
Discourse Calendar adds the ability to create a dynamic calendar in the first post of a topic on the open-source discussion platform Discourse. Prior to version 0.4, event invitees created in topics in private categories or PMs (private messages) can be retrieved by anyone, even if they're not logged in. This problem is resolved in version 0.4 of the discourse-calendar plugin. While no known workaround is available, putting the site behind `login_required` will disallow this endpoint to be used by anonymous users, but logged in users can still get the list of invitees in the private topics.
Discourse dicourse-calendar Plugin XSS via Unescaped Event Titles
CVE-2023-43658
6.1 - Medium
- October 16, 2023
dicourse-calendar is a plugin for the Discourse messaging platform which adds the ability to create a dynamic calendar in the first post of a topic. Improper escaping of event titles could lead to Cross-site Scripting (XSS) within the 'email preview' UI when a site has CSP disabled. Having CSP disabled is a non-default configuration, so the vast majority of sites are unaffected. This problem is resolved in the latest version of the discourse-calendar plugin. Users are advised to upgrade. Users unable to upgrade should ensure CSP is enabled on the forum.
XSS
Discourse-calendar CVE202241913: Private Group Data Exposure via Events
CVE-2022-41913
5.4 - Medium
- November 14, 2022
Discourse-calendar is a plugin for the Discourse messaging platform which adds the ability to create a dynamic calendar in the first post of a topic. Members of private groups or public groups with private members can be listed by users, who can create and edit post events. This vulnerability only affects sites which have discourse post events enabled. This issue has been patched in commit `ca5ae3e7e` which will be included in future releases. Users unable to upgrade should disable the `discourse_post_event_enabled` setting to fully mitigate the issue. Also, it's possible to prevent regular users from using this vulnerability by removing all groups from the `discourse_post_event_allowed_on_groups` but note that moderators will still be able to use it.
Discourse Calendar is a calendar plugin for Discourse, an open-source messaging app
CVE-2022-31059
5.4 - Medium
- June 14, 2022
Discourse Calendar is a calendar plugin for Discourse, an open-source messaging app. Prior to version 1.0.1, parsing and rendering of Event names can be susceptible to cross-site scripting (XSS) attacks. This vulnerability only affects sites which have modified or disabled Discourseâs default Content Security Policy. This issue is patched in version 1.0.1 of the Discourse Calendar plugin. As a workaround, ensure that the Content Security Policy is enabled, and has not been modified in a way which would make it more vulnerable to XSS attacks.
XSS
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Discourse Calendar or by Discourse? Click the Watch button to subscribe.