Security News > 2021 > October > CISA urges admins to patch critical Discourse code execution bug

A critical Discourse remote code execution vulnerability tracked as CVE-2021-41163 was fixed via an urgent update by the developer on Friday.
Discourse is an open-source forum, long-form chat, and mailing list management platform widely deployed on the web, offering excellent usability and integration potential while focusing heavily on social features.
According to official stats, Discourse was used to publish 3.5 million posts viewed by 405 million users in September 2021 alone.
Because of Discourse's widespread use, CISA also published an alert about the flaw, urging forum admins to update to the latest available version or apply the necessary workarounds.
A Shodan search has returned 8,641 Discourse deployments, many of which could still be exposed to RCE exploitation potential.
The researcher who discovered the flaw told BleepingComputer that he reported the problem to the Discourse team immediately, on October 10, 2021.
News URL
Related news
- CrushFTP: Patch critical vulnerability ASAP! (CVE-2025-2825) (source)
- Still Using an Older Version of iOS or iPadOS? Update Now to Patch These Critical Security Vulnerabilities (source)
- Fortinet Urges FortiSwitch Upgrades to Patch Critical Admin Password Change Flaw (source)
- CISA extends funding to ensure 'no lapse in critical CVE services' (source)
- Critical Erlang/OTP SSH Vulnerability (CVSS 10.0) Allows Unauthenticated Code Execution (source)
- Critical Erlang/OTP SSH pre-auth RCE is 'Surprisingly Easy' to exploit, patch now (source)
- Critical Erlang/OTP SSH RCE bug now has public exploits, patch now (source)
- Critical Langflow Flaw Added to CISA KEV List Amid Ongoing Exploitation Evidence (source)
- CISA warns of hackers targeting critical oil infrastructure (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-10-20 | CVE-2021-41163 | Injection vulnerability in Discourse Discourse is an open source platform for community discussion. | 9.8 |