CVE-2025-68934

Discourse is an open source discussion platform. In versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0, authenticated users can submit crafted payloads to /drafts.json that cause O(n^2) processing in Base62.decode, tying up workers for 35-60 seconds per request. This affects all users as the shared worker pool becomes exhausted. This issue is patched in versions 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0. Lowering the max_draft_length site setting reduces attack surface but does not fully mitigate the issue, as payloads under the limit can still trigger the slow code path.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:*
cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:*
cpe:2.3:a:discourse:discourse:2025.12.0:*:*:*:stable:*:*:*
cpe:2.3:a:discourse:discourse:2026.1.0:*:*:*:stable:*:*:*

History

30 Jan 2026, 20:47

Type Values Removed Values Added
References () https://github.com/discourse/discourse/security/advisories/GHSA-vwjh-vrx9-9849 - () https://github.com/discourse/discourse/security/advisories/GHSA-vwjh-vrx9-9849 - Third Party Advisory, Mitigation
CPE cpe:2.3:a:discourse:discourse:2026.1.0:*:*:*:stable:*:*:*
cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:*
cpe:2.3:a:discourse:discourse:2025.12.0:*:*:*:stable:*:*:*
First Time Discourse
Discourse discourse

28 Jan 2026, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-28 20:16

Updated : 2026-01-30 20:47


NVD link : CVE-2025-68934

Mitre link : CVE-2025-68934

CVE.ORG link : CVE-2025-68934


JSON object : View

Products Affected

discourse

  • discourse
CWE
CWE-770

Allocation of Resources Without Limits or Throttling