Get a Demo

Let's Patch It!

Book a short call with one our specialists, we'll walk you through how Endor Patches work, and ask you a few questions about your environment (like your primary programming languages and repository management). We'll also send you an email right after you fill out the form, feel free to reply with any questions you have in advance!

CVE

CVE-2026-26265

Discourse has IDOR vulnerability in the directory items endpoint
Back to all
CVE

CVE-2026-26265

Discourse has IDOR vulnerability in the directory items endpoint

Discourse is an open source discussion platform. Prior to versions 2025.12.2, 2026.1.1, and 2026.2.0, an IDOR vulnerability in the directory items endpoint allows any user, including anonymous users, to retrieve private user field values for all users in the directory. The userfieldids parameter in DirectoryItemsController#index accepts arbitrary user field IDs without authorization checks, bypassing the visibility restrictions (showonprofile / showonuser_card) that are enforced elsewhere (e.g., UserCardSerializer via Guardian#alloweduserfield_ids). An attacker can request GET /directoryitems.json?period=all&userfield_ids=<id> with any private field ID and receive that field's value for every user in the directory response. This enables bulk exfiltration of private user data such as phone numbers, addresses, or other sensitive custom fields that admins have explicitly configured as non-public. The issue is patched in versions 2025.12.2, 2026.1.1, and 2026.2.0 by filtering userfieldids against UserField.public_fields for non-staff users before building the custom field map. As a workaround, site administrators can remove sensitive data from private user fields, or disable the user directory via the enableuserdirectory site setting.

Package Versions Affected

Package Version
patch Availability
No items found.

Automatically patch vulnerabilities without upgrading

Fix Without Upgrading
Detect compatible fix
Apply safe remediation
Fix with a single pull request

CVSS Version

Severity
Base Score
CVSS Version
Score Vector
C
H
U
7.5
-
3.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
C
H
U
0
-
3.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
C
H
U
-

Related Resources

No items found.

References

https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/26xxx/CVE-2026-26265.json, https://github.com/discourse/discourse/security/advisories/GHSA-crxf-p6jm-vpgw, https://nvd.nist.gov/vuln/detail/CVE-2026-26265

Severity

7.5

CVSS Score
0
10

Basic Information

Ecosystem
Base CVSS
7.5
EPSS Probability
0.0005%
EPSS Percentile
0.15493%
Introduced Version
0,322d3c0ac6a8f133b3f82875e9dbbe310f638c1b,f7cec86997edc21d6074ceb7666f7e2e6e1b1fdf
Fix Available
9c924c6f4f3885ab616e21bec2447af7056b4322,8a2a8b7d3a494435949a12ad078b22509f54bd58,f7cec86997edc21d6074ceb7666f7e2e6e1b1fdf

Fix Critical Vulnerabilities Instantly

Secure your app without upgrading.
Fix Without Upgrading