Discourse <2026.3.0-latest.1: Unauthorized Tag Synonym Creation in Restricted Groups
CVE-2026-33426 Published on March 20, 2026

Discourse users can edit or synonymize hidden tags they can't see
Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, users with tag-editing permissions could edit and create synonyms for tags hidden in restricted tag groups, even if they lacked visibility into those tags. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. No known workarounds are available.

NVD

Vulnerability Analysis

CVE-2026-33426 is exploitable with network access, requires user interaction and user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality and integrity, and no impact on availability.

Attack Vector:
NETWORK
Attack Complexity:
LOW
Privileges Required:
HIGH
User Interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality Impact:
LOW
Integrity Impact:
LOW
Availability Impact:
NONE

Weakness Type

What is an AuthZ Vulnerability?

The software does not perform an authorization check when an actor attempts to access a resource or perform an action.

CVE-2026-33426 has been classified to as an AuthZ vulnerability or weakness.


Products Associated with CVE-2026-33426

Want to know whenever a new CVE is published for Discourse? stack.watch will email you.

 

Affected Versions

discourse: