{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-07T23:03:19.999","vulnerabilities":[{"cve":{"id":"CVE-2024-45051","sourceIdentifier":"security-advisories@github.com","published":"2024-10-07T21:15:16.930","lastModified":"2025-09-25T20:27:34.887","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Discourse is an open source platform for community discussion. A maliciously crafted email address could allow an attacker to bypass domain-based restrictions and gain access to private sites, categories and/or groups. This issue has been patched in the latest stable, beta and tests-passed version of Discourse. All users area are advised to upgrade. There are no known workarounds for this vulnerability."},{"lang":"es","value":"Discourse es una plataforma de código abierto para debates comunitarios. Una dirección de correo electrónico manipulada con fines malintencionados podría permitir a un atacante eludir las restricciones basadas en dominios y obtener acceso a sitios, categorías o grupos privados. Este problema se ha corregido en la última versión estable, beta y de pruebas aprobadas de Discourse. Se recomienda a todos los usuarios del área que actualicen la versión. No se conocen workarounds para esta vulnerabilidad."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N","baseScore":8.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":4.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N","baseScore":8.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":4.2}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-287"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:*","versionEndExcluding":"3.3.2","matchCriteriaId":"16A670AB-8B0F-4866-9592-0B463C93175C"},{"vulnerable":true,"criteria":"cpe:2.3:a:discourse:discourse:*:*:*:*:beta:*:*:*","versionEndExcluding":"3.4.0","matchCriteriaId":"B70F4653-EB23-49AB-AF71-C39E5B6D5E5F"},{"vulnerable":true,"criteria":"cpe:2.3:a:discourse:discourse:3.4.0:beta1:*:*:beta:*:*:*","matchCriteriaId":"AF6D8860-8764-4EEF-9FDD-89FF932791A7"}]}]}],"references":[{"url":"https://github.com/discourse/discourse/security/advisories/GHSA-2vjv-pgh4-6rmq","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}