{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T20:14:33.367","vulnerabilities":[{"cve":{"id":"CVE-2024-39320","sourceIdentifier":"security-advisories@github.com","published":"2024-07-30T15:15:12.180","lastModified":"2024-11-21T09:27:27.230","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Discourse is an open source discussion platform. Prior to 3.2.5 and 3.3.0.beta5, the vulnerability allows an attacker to inject iframes from any domain, bypassing the intended restrictions enforced by the allowed_iframes setting. This vulnerability is fixed in 3.2.5 and 3.3.0.beta5."},{"lang":"es","value":" Discourse es una plataforma de discusión de código abierto. Antes de 3.2.5 y 3.3.0.beta5, la vulnerabilidad permitía a un atacante inyectar iframes desde cualquier dominio, evitando las restricciones previstas impuestas por la configuración de Allow_iframes. Esta vulnerabilidad se solucionó en 3.2.5 y 3.3.0.beta5."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-74"},{"lang":"en","value":"CWE-1021"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-1021"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:*","versionEndExcluding":"3.2.5","matchCriteriaId":"1E60FC27-D34F-462D-97E0-9B0A3A2D5CFD"},{"vulnerable":true,"criteria":"cpe:2.3:a:discourse:discourse:3.3.0:beta1:*:*:beta:*:*:*","matchCriteriaId":"4FE1C6B5-D21B-46CC-A889-EECE10A7130A"},{"vulnerable":true,"criteria":"cpe:2.3:a:discourse:discourse:3.3.0:beta2:*:*:beta:*:*:*","matchCriteriaId":"51C031F6-729E-4560-B33D-382177F2DB7D"},{"vulnerable":true,"criteria":"cpe:2.3:a:discourse:discourse:3.3.0:beta3:*:*:beta:*:*:*","matchCriteriaId":"5C2ABCC5-86B0-4CFF-AB99-BAC4D5CD94C7"},{"vulnerable":true,"criteria":"cpe:2.3:a:discourse:discourse:3.3.0:beta4:*:*:beta:*:*:*","matchCriteriaId":"F43AEDD5-616E-4ADF-BA3E-8B1537A7CDE7"}]}]}],"references":[{"url":"https://github.com/discourse/discourse/commit/188cb58daa833839c54c266ce22db150a3f3a210","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/discourse/discourse/commit/76f06f6b1491db6bd09a4017d2c5591431b3b16e","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/discourse/discourse/security/advisories/GHSA-4p82-xh38-gq4p","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://github.com/discourse/discourse/commit/188cb58daa833839c54c266ce22db150a3f3a210","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/discourse/discourse/commit/76f06f6b1491db6bd09a4017d2c5591431b3b16e","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/discourse/discourse/security/advisories/GHSA-4p82-xh38-gq4p","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}