Zulip is an open-source team collaboration tool. The API for deleting an organization custom profile field is supposed to be restricted to organization administrators, but its handler failed to check that the field belongs to the same organization as the user. Therefore, an administrator of any organization was incorrectly allowed to delete custom profile fields belonging to a different organization. This is fixed in Zulip Server 10.1.
References
Link | Resource |
---|---|
https://github.com/zulip/zulip/security/advisories/GHSA-fcgx-q63f-7gw4 | Patch Third Party Advisory |
Configurations
History
27 Aug 2025, 01:47
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CPE | cpe:2.3:a:zulip:zulip:*:*:*:*:*:*:*:* | |
References | () https://github.com/zulip/zulip/security/advisories/GHSA-fcgx-q63f-7gw4 - Patch, Third Party Advisory | |
First Time |
Zulip zulip
Zulip |
31 Mar 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-31 17:15
Updated : 2025-08-27 01:47
NVD link : CVE-2025-30369
Mitre link : CVE-2025-30369
CVE.ORG link : CVE-2025-30369
JSON object : View
Products Affected
zulip
- zulip
CWE
CWE-566
Authorization Bypass Through User-Controlled SQL Primary Key