Discourse is an open-source discussion platform. Prior to versions `3.3.4` on the `stable` branch and `3.4.0.beta5` on the `beta` branch, someone who is about to reach the limit of users in a group DM may send requests to add new users in parallel. The requests might all go through ignoring the limit due to a race condition. The patch in versions `3.3.4` and `3.4.0.beta5` uses the `lock` step in service to wrap part of the `add_users_to_channel` service inside a distributed lock/mutex in order to avoid the race condition.
References
Configurations
Configuration 1 (hide)
|
History
06 Nov 2025, 22:05
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/discourse/discourse/security/advisories/GHSA-hfcx-qjw6-573r - Vendor Advisory |
Information
Published : 2025-03-26 14:15
Updated : 2025-11-06 22:05
NVD link : CVE-2025-24808
Mitre link : CVE-2025-24808
CVE.ORG link : CVE-2025-24808
JSON object : View
Products Affected
discourse
- discourse
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
