Security News > 2021 > October > CISA urges admins to patch critical Discourse code execution bug

A critical Discourse remote code execution vulnerability tracked as CVE-2021-41163 was fixed via an urgent update by the developer on Friday.
Discourse is an open-source forum, long-form chat, and mailing list management platform widely deployed on the web, offering excellent usability and integration potential while focusing heavily on social features.
According to official stats, Discourse was used to publish 3.5 million posts viewed by 405 million users in September 2021 alone.
Because of Discourse's widespread use, CISA also published an alert about the flaw, urging forum admins to update to the latest available version or apply the necessary workarounds.
A Shodan search has returned 8,641 Discourse deployments, many of which could still be exposed to RCE exploitation potential.
The researcher who discovered the flaw told BleepingComputer that he reported the problem to the Discourse team immediately, on October 10, 2021.
News URL
Related news
- Critical flaws in Mongoose library expose MongoDB to data thieves, code execution (source)
- Elastic Releases Urgent Fix for Critical Kibana Vulnerability Enabling Remote Code Execution (source)
- CISA tags critical Ivanti EPM flaws as actively exploited in attacks (source)
- Choose your own Patch Tuesday adventure: Start with six zero day fixes, or six critical flaws (source)
- CISA: Medusa ransomware hit over 300 critical infrastructure orgs (source)
- Critical Veeam Backup & Replication RCE vulnerability fixed, patch ASAP! (CVE-2025-23120) (source)
- CrushFTP: Patch critical vulnerability ASAP! (CVE-2025-2825) (source)
- Still Using an Older Version of iOS or iPadOS? Update Now to Patch These Critical Security Vulnerabilities (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-10-20 | CVE-2021-41163 | Injection vulnerability in Discourse Discourse is an open source platform for community discussion. | 9.8 |