{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T15:01:33.052","vulnerabilities":[{"cve":{"id":"CVE-2021-32764","sourceIdentifier":"security-advisories@github.com","published":"2021-07-15T21:15:09.373","lastModified":"2024-11-21T06:07:41.667","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Discourse is an open-source discussion platform. In Discourse versions 2.7.5 and prior, parsing and rendering of YouTube Oneboxes can be susceptible to XSS attacks. This vulnerability only affects sites which have modified or disabled Discourse's default Content Security Policy. The issue is patched in `stable` version 2.7.6, `beta` version 2.8.0.beta3, and `tests-passed` version 2.8.0.beta3. As a workaround, ensure that the Content Security Policy is enabled, and has not been modified in a way which would make it more vulnerable to XSS attacks."},{"lang":"es","value":"Discourse es una plataforma de debate de código abierto. En Discourse versiones 2.7.5 y anteriores, el análisis y la renderización de los Oneboxes de YouTube pueden ser susceptibles a ataques de tipo XSS. Esta vulnerabilidad sólo afecta a los sitios que han modificado o desactivado la política de seguridad de contenidos predeterminada de Discourse. El problema está parcheado en versiones \"estable\" 2.7.6, \"beta\" 2.8.0.beta3 y \"tests-passed\" 2.8.0.beta3. Como solución, asegúrese de que la política de seguridad de contenidos está activada y no ha sido modificada de manera que sea más vulnerable a ataques de tipo XSS"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":5.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.5}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","baseScore":3.5,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:*","versionEndIncluding":"2.7.5","matchCriteriaId":"BE17BE6D-684F-4D02-BD74-A5527DC5075E"},{"vulnerable":true,"criteria":"cpe:2.3:a:discourse:discourse:2.8.0:beta1:*:*:*:*:*:*","matchCriteriaId":"9E7F8AC4-35D1-45E5-8A3A-B0205000A5D3"}]}]}],"references":[{"url":"https://github.com/discourse/discourse/security/advisories/GHSA-9x4c-29xg-56hw","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/discourse/discourse/security/advisories/GHSA-9x4c-29xg-56hw","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}