CVE-2026-26979 Overview
CVE-2026-26979 is an authorization bypass vulnerability affecting Discourse, an open source discussion platform. Prior to versions 2025.12.2, 2026.1.1, and 2026.2.0, Trust Level 4 (TL4) users are able to close, archive, and pin topics in private categories they don't have access to. This vulnerability represents a broken access control issue that allows privileged users to perform unauthorized actions on content they should not be able to manage.
Critical Impact
TL4 users can manipulate topics in private categories without proper authorization, potentially disrupting private discussions and violating community access boundaries.
Affected Products
- Discourse versions prior to 2025.12.2
- Discourse versions prior to 2026.1.1
- Discourse versions prior to 2026.2.0
Discovery Timeline
- 2026-02-26 - CVE CVE-2026-26979 published to NVD
- 2026-02-26 - Last updated in NVD database
Technical Details for CVE-2026-26979
Vulnerability Analysis
This vulnerability is classified under CWE-862 (Missing Authorization), which occurs when an application does not perform proper authorization checks before allowing an action to be executed. In the context of Discourse, the platform implements a trust level system where TL4 users (also known as "Leaders") have elevated privileges to help moderate community content.
The flaw exists because the authorization checks for topic management actions (closing, archiving, and pinning) fail to properly verify whether the TL4 user has explicit access to the private category containing the target topic. This means that while a TL4 user may have the capability to perform these moderation actions on topics they can access, the system incorrectly extends this privilege to private categories where they have no membership or viewing rights.
The vulnerability requires network access and high-level privileges (TL4 status), but does not require user interaction to exploit. An attacker with TL4 privileges could potentially disrupt private discussions by archiving or closing active topics, or manipulate topic visibility within private categories.
Root Cause
The root cause is a missing authorization check in the topic management functionality. When processing requests to close, archive, or pin topics, the application validates that the user has TL4 privileges but fails to verify that the user has been granted access to the specific private category containing the topic. This results in an incomplete authorization model where role-based permissions are checked without corresponding resource-based access verification.
Attack Vector
The attack vector is network-based. A malicious TL4 user can craft requests to the Discourse API endpoints responsible for topic management actions, specifying topic IDs that belong to private categories they cannot view. Because the authorization logic only verifies the user's trust level and not their category membership, these requests are processed successfully.
The attack requires the attacker to know or enumerate valid topic IDs within private categories. While they cannot read the content of these topics, they can affect their state by closing, archiving, or pinning them.
Detection Methods for CVE-2026-26979
Indicators of Compromise
- Review audit logs for topic state changes (close, archive, pin) performed by TL4 users on categories they are not members of
- Look for unusual patterns of topic management actions spanning multiple private categories
- Monitor for API requests to topic management endpoints with topic IDs belonging to restricted categories
Detection Strategies
- Implement logging correlation between user category memberships and topic management actions
- Create alerts for topic state changes in private categories where the acting user lacks explicit access
- Review historical logs for topic management actions that may have exploited this vulnerability prior to patching
Monitoring Recommendations
- Enable detailed audit logging for all topic moderation actions
- Set up real-time alerts for topic state changes in sensitive private categories
- Regularly review TL4 user activity across category boundaries
How to Mitigate CVE-2026-26979
Immediate Actions Required
- Upgrade Discourse to version 2025.12.2, 2026.1.1, or 2026.2.0 or later immediately
- Review audit logs to identify any potential exploitation of this vulnerability
- Verify the integrity of topic states in private categories
- Consider temporarily restricting TL4 privileges if patching cannot be performed immediately
Patch Information
The vulnerability has been addressed in Discourse versions 2025.12.2, 2026.1.1, and 2026.2.0. Organizations should upgrade to one of these patched versions based on their current deployment branch. Additional details are available in the GitHub Security Advisory.
Workarounds
- No known workarounds are available according to the vendor advisory
- Organizations unable to patch immediately should consider restricting TL4 privileges or closely monitoring TL4 user activity
- Consider implementing additional network-level access controls to limit API access
# Upgrade Discourse to patched version
cd /var/discourse
./launcher rebuild app
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


