CVE-2025-32376

4.3 MEDIUM

📋 TL;DR

This vulnerability allows attackers to bypass the user limit for direct messages (DMs) in Discourse, potentially creating DMs that include every user on a site. This affects all Discourse instances running versions before 3.4.3 on stable branch or 3.5.0.beta3 on beta branch.

💻 Affected Systems

Products:
  • Discourse
Versions: All versions before 3.4.3 (stable) and 3.5.0.beta3 (beta)
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All standard Discourse installations are affected; no special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker creates a DM containing all site users, enabling mass spam, phishing, or harassment campaigns across the entire user base.

🟠

Likely Case

Limited spam or targeted harassment through DMs with more users than intended, potentially overwhelming users with unwanted messages.

🟢

If Mitigated

Minimal impact if proper monitoring detects unusual DM creation patterns and user reporting mechanisms are effective.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated user access; the bypass mechanism is straightforward once identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.4.3 (stable) or 3.5.0.beta3 (beta)

Vendor Advisory: https://github.com/discourse/discourse/security/advisories/GHSA-mqqq-h2x3-46fr

Restart Required: Yes

Instructions:

1. Backup your Discourse instance. 2. Update to Discourse version 3.4.3 or higher using standard update procedures. 3. Restart the application server.

🔧 Temporary Workarounds

Temporarily disable DM creation

all

Disable direct message functionality until patching is complete

Modify Discourse settings to disable 'enable_direct_messages'

🧯 If You Can't Patch

  • Implement rate limiting on DM creation to detect anomalies
  • Monitor logs for unusual DM activity patterns

🔍 How to Verify

Check if Vulnerable:

Check Discourse version via admin panel or run: `cd /var/discourse && ./launcher status app`

Check Version:

cd /var/discourse && cat containers/app.yml | grep version

Verify Fix Applied:

Confirm version is 3.4.3 or higher and test DM creation with multiple users to ensure limit enforcement

📡 Detection & Monitoring

Log Indicators:

  • Unusually large number of users added to single DM
  • Multiple DM creation attempts exceeding normal limits

Network Indicators:

  • Spike in API calls to DM creation endpoints

SIEM Query:

source="discourse_logs" AND (message="*direct_message*" AND user_count > 10)

🔗 References

📤 Share & Export