CVE-2022-46177

Discourse password reset link can lead to in account takeover if user changes to a new email

Discourse is an option source discussion platform. Prior to version 2.8.14 on the `stable` branch and version 3.0.0.beta16 on the `beta` and `tests-passed` branches, when a user requests for a password reset link email, then changes their primary email, the old reset email is still valid. When the old reset email is used to reset the password, the Discourse account's primary email would be re-linked to the old email. If the old email address is compromised or has transferred ownership, this leads to an account takeover. This is however mitigated by the SiteSetting `email_token_valid_hours` which is currently 48 hours. Users should upgrade to versions 2.8.14 or 3.0.0.beta15 to receive a patch. As a workaround, lower `email_token_valid_hours ` as needed.


We have discovered 652 live websites that are affected by CVE-2022-46177.

Run a Free Instant Scan




Affected Software

Product  Discourse
Category Message Boards
Vulnerable Domains652 live websites (15% of Discourse install base)
Vulnerable Versions
  • from 0 through 2.8.14
  • from 2.9 through 3
Vulnerable Versions Count30 versions ( 42% of all versions)


Common Weakness Enumeration

CWE-613 Insufficient Session Expiration



Details

  • Published - Jan 5, 2023
  • Updated - Mar 10, 2025

Website Distribution by Country

Number of websites using CVE-2022-46177
United States427 websites



Germany58 websites
France24 websites
Singapore16 websites
China14 websites
Brazil12 websites
Russia8 websites
Netherlands7 websites
Switzerland7 websites
India5 websites

Website Distribution by TLD

Number of websites using CVE-2022-46177
.com271 websites
.org106 websites
.io34 websites
.net24 websites
.de15 websites
.co9 websites
.fr9 websites
.cn7 websites
.ru7 websites
.info6 websites

Vulnerable Versions

Vulnerable versions are highlighted in red

Websites affected by CVE-2022-46177

Top websites that are affected by CVE-2022-46177. Please click on the "Contact us" link to get more information.
DomainCountryRankContacts
******.********.com United States**,***
*********.**********.de Germany***,***
*********.**********.io United States***,***
*****.******.com United States***,***
***********.net United States***,***
*********.****.ly United States***,***
*****.***********.com United States***,***
*************.com United States***,***
********.com United States***,***
*****.com United States***,***
See full domain list

FAQ

CVE-2022-46177 is Insufficient Session Expiration in Discourse
A total of 652 websites have been identified as vulnerable to CVE-2022-46177, based on global website indexing conducted by WebTechSurvey.
The Discourse is affected by the CVE-2022-46177 vulnerability.
Discourse versions up to 3 are vulnerable to CVE-2022-46177.
CVE-2022-46177 is resolved in version 3 of Discourse.