CVE-2022-46159: CWE-770: Allocation of Resources Without Limits or Throttling in discourse discourse
Discourse is an open-source discussion platform. In version 2.8.13 and prior on the `stable` branch and version 2.9.0.beta14 and prior on the `beta` and `tests-passed` branches, any authenticated user can create an unlisted topic. These topics, which are not readily available to other users, can take up unnecessary site resources. A patch for this issue is available in the `main` branch of Discourse. There are no known workarounds available.
AI Analysis
Technical Summary
CVE-2022-46159 is a medium-severity vulnerability affecting Discourse, an open-source discussion platform widely used for community forums and collaboration. The vulnerability arises from improper resource allocation controls (CWE-770) in Discourse versions 2.8.13 and earlier on the stable branch, as well as versions 2.9.0.beta0 through 2.9.0.beta14 on the beta and tests-passed branches. Specifically, any authenticated user can create unlisted topics—topics that are not visible or readily accessible to other users. Because these unlisted topics consume server resources such as database storage, memory, and processing power without effective limits or throttling, an attacker could exploit this to create a large number of such topics, leading to resource exhaustion. This could degrade the performance of the Discourse instance, potentially causing denial of service (DoS) conditions. The vulnerability does not require elevated privileges beyond authentication, nor does it require user interaction beyond the creation of topics. There are no known workarounds, but a patch addressing this issue is available in the main branch of Discourse. No known exploits have been reported in the wild to date.
Potential Impact
For European organizations using Discourse as a community or collaboration platform, this vulnerability could lead to service degradation or denial of service due to resource exhaustion. This can affect the availability and reliability of communication channels critical for internal collaboration, customer engagement, or public forums. While the confidentiality and integrity of data are not directly impacted, the disruption of service availability can have significant operational and reputational consequences. Organizations with large user bases or those that allow broad authenticated user access are at higher risk. Additionally, sectors relying on timely and continuous communication—such as government agencies, educational institutions, and critical infrastructure operators—may experience amplified impacts. The lack of known exploits reduces immediate risk, but the ease of exploitation (any authenticated user can trigger the issue) means that insider threats or compromised accounts could be leveraged to cause disruption.
Mitigation Recommendations
European organizations should promptly upgrade Discourse installations to the latest main branch version where the patch is applied. Since no workarounds exist, patching is the primary mitigation. Additionally, organizations can implement the following practical controls: 1) Restrict topic creation permissions to trusted user groups to limit potential abuse. 2) Monitor the number of unlisted topics created per user and implement custom rate limiting or alerting mechanisms to detect anomalous activity. 3) Employ resource monitoring on servers hosting Discourse to identify unusual spikes in resource consumption early. 4) Consider deploying web application firewalls (WAFs) with custom rules to detect and throttle excessive topic creation requests. 5) Regularly audit user accounts and enforce strong authentication to reduce the risk of compromised credentials being used to exploit this vulnerability. 6) Engage with the Discourse community or vendor for updates and best practices related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy, Spain
CVE-2022-46159: CWE-770: Allocation of Resources Without Limits or Throttling in discourse discourse
Description
Discourse is an open-source discussion platform. In version 2.8.13 and prior on the `stable` branch and version 2.9.0.beta14 and prior on the `beta` and `tests-passed` branches, any authenticated user can create an unlisted topic. These topics, which are not readily available to other users, can take up unnecessary site resources. A patch for this issue is available in the `main` branch of Discourse. There are no known workarounds available.
AI-Powered Analysis
Technical Analysis
CVE-2022-46159 is a medium-severity vulnerability affecting Discourse, an open-source discussion platform widely used for community forums and collaboration. The vulnerability arises from improper resource allocation controls (CWE-770) in Discourse versions 2.8.13 and earlier on the stable branch, as well as versions 2.9.0.beta0 through 2.9.0.beta14 on the beta and tests-passed branches. Specifically, any authenticated user can create unlisted topics—topics that are not visible or readily accessible to other users. Because these unlisted topics consume server resources such as database storage, memory, and processing power without effective limits or throttling, an attacker could exploit this to create a large number of such topics, leading to resource exhaustion. This could degrade the performance of the Discourse instance, potentially causing denial of service (DoS) conditions. The vulnerability does not require elevated privileges beyond authentication, nor does it require user interaction beyond the creation of topics. There are no known workarounds, but a patch addressing this issue is available in the main branch of Discourse. No known exploits have been reported in the wild to date.
Potential Impact
For European organizations using Discourse as a community or collaboration platform, this vulnerability could lead to service degradation or denial of service due to resource exhaustion. This can affect the availability and reliability of communication channels critical for internal collaboration, customer engagement, or public forums. While the confidentiality and integrity of data are not directly impacted, the disruption of service availability can have significant operational and reputational consequences. Organizations with large user bases or those that allow broad authenticated user access are at higher risk. Additionally, sectors relying on timely and continuous communication—such as government agencies, educational institutions, and critical infrastructure operators—may experience amplified impacts. The lack of known exploits reduces immediate risk, but the ease of exploitation (any authenticated user can trigger the issue) means that insider threats or compromised accounts could be leveraged to cause disruption.
Mitigation Recommendations
European organizations should promptly upgrade Discourse installations to the latest main branch version where the patch is applied. Since no workarounds exist, patching is the primary mitigation. Additionally, organizations can implement the following practical controls: 1) Restrict topic creation permissions to trusted user groups to limit potential abuse. 2) Monitor the number of unlisted topics created per user and implement custom rate limiting or alerting mechanisms to detect anomalous activity. 3) Employ resource monitoring on servers hosting Discourse to identify unusual spikes in resource consumption early. 4) Consider deploying web application firewalls (WAFs) with custom rules to detect and throttle excessive topic creation requests. 5) Regularly audit user accounts and enforce strong authentication to reduce the risk of compromised credentials being used to exploit this vulnerability. 6) Engage with the Discourse community or vendor for updates and best practices related to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-11-28T17:27:19.997Z
- Cisa Enriched
- true
Threat ID: 682d9846c4522896dcbf4ef6
Added to database: 5/21/2025, 9:09:26 AM
Last enriched: 6/22/2025, 11:20:32 AM
Last updated: 8/4/2025, 10:17:06 AM
Views: 11
Related Threats
CVE-2025-9012: SQL Injection in PHPGurukul Online Shopping Portal Project
MediumCVE-2025-9011: SQL Injection in PHPGurukul Online Shopping Portal Project
MediumCVE-2025-9010: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-9009: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-31961: CWE-1220 Insufficient Granularity of Access Control in HCL Software Connections
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.