Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-28135 | Zulip is an open-source team chat application. Starting in version 10.0 and prior to version 10.3, the "Who can create public channels" access control mechanism can be circumvented by creating a private or web-public channel, and then changing the channel privacy to public. A similar technique works for creating private channels without permission, though such a process requires either the API or modifying the HTML, as we do mark the "private" radio button as disabled in such cases. Version 10.3 contains a patch. |
Wed, 27 Aug 2025 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:zulip:zulip:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Fri, 16 May 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 15 May 2025 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Zulip is an open-source team chat application. Starting in version 10.0 and prior to version 10.3, the "Who can create public channels" access control mechanism can be circumvented by creating a private or web-public channel, and then changing the channel privacy to public. A similar technique works for creating private channels without permission, though such a process requires either the API or modifying the HTML, as we do mark the "private" radio button as disabled in such cases. Version 10.3 contains a patch. | |
| Title | Zulip Server has access control bypass for restrictions on creation of specific channel types | |
| Weaknesses | CWE-863 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-05-16T13:19:46.691Z
Reserved: 2025-05-14T10:32:43.529Z
Link: CVE-2025-47930
Updated: 2025-05-16T13:19:43.547Z
Status : Analyzed
Published: 2025-05-16T00:15:18.840
Modified: 2025-08-27T02:26:59.770
Link: CVE-2025-47930
No data.
OpenCVE Enrichment
Updated: 2025-06-24T09:44:18Z
EUVD