Skip to main content

CVE-2022-21706: CWE-863: Incorrect Authorization in zulip zulip

Medium
Published: Fri Feb 25 2022 (02/25/2022, 23:25:10 UTC)
Source: CVE
Vendor/Project: zulip
Product: zulip

Description

Zulip is an open-source team collaboration tool with topic-based threading. Zulip Server version 2.0.0 and above are vulnerable to insufficient access control with multi-use invitations. A Zulip Server deployment which hosts multiple organizations is vulnerable to an attack where an invitation created in one organization (potentially as a role with elevated permissions) can be used to join any other organization. This bypasses any restrictions on required domains on users' email addresses, may be used to gain access to organizations which are only accessible by invitation, and may be used to gain access with elevated privileges. This issue has been patched in release 4.10. There are no known workarounds for this issue. ### Patches _Has the problem been patched? What versions should users upgrade to?_ ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ ### References _Are there any links users can visit to find out more?_ ### For more information If you have any questions or comments about this advisory, you can discuss them on the [developer community Zulip server](https://zulip.com/developer-community/), or email the [Zulip security team](mailto:security@zulip.com).

AI-Powered Analysis

AILast updated: 06/23/2025, 17:32:41 UTC

Technical Analysis

CVE-2022-21706 is a security vulnerability affecting Zulip Server, an open-source team collaboration platform known for its topic-based threading. The vulnerability exists in Zulip Server versions 2.0.0 up to but not including 4.10. It arises from insufficient access control related to multi-use invitations in deployments hosting multiple organizations. Specifically, an invitation generated within one organization—potentially granting elevated permissions—can be exploited to join any other organization hosted on the same Zulip Server instance. This bypasses domain-based restrictions on user email addresses and invitation-only access controls. Consequently, an attacker can gain unauthorized access to organizations they should not be able to join, possibly with elevated privileges if the invitation role is privileged. The vulnerability is classified under CWE-863 (Incorrect Authorization) and CWE-284 (Improper Access Control). The issue has been addressed and patched in Zulip Server version 4.10. No known workarounds exist, so upgrading is the primary remediation. There are no known exploits in the wild at this time. The vulnerability impacts the confidentiality and integrity of organizational data by allowing unauthorized access and privilege escalation within multi-tenant Zulip Server deployments. Exploitation requires no user interaction beyond using the invitation link, and authentication is effectively bypassed by the invitation misuse. The scope is limited to Zulip Server instances hosting multiple organizations, which is a common deployment scenario for enterprises and institutions using Zulip for internal collaboration.

Potential Impact

For European organizations using Zulip Server in multi-organization deployments, this vulnerability poses a significant risk to data confidentiality and organizational integrity. Unauthorized access to sensitive communications, documents, and collaboration channels can lead to data leakage, intellectual property theft, or insider threat scenarios. Elevated privileges gained through invitation misuse could allow attackers to modify or delete critical information, disrupt workflows, or impersonate legitimate users. Organizations relying on domain-based restrictions to segregate access between different business units or partners will find these controls ineffective against this vulnerability. The absence of known exploits reduces immediate risk, but the potential for targeted attacks remains, especially against organizations with sensitive or regulated data. This vulnerability could also undermine trust in collaboration platforms and complicate compliance with data protection regulations such as GDPR, given the unauthorized cross-organization data access it enables.

Mitigation Recommendations

The primary and only effective mitigation is to upgrade all Zulip Server deployments to version 4.10 or later, where the vulnerability is patched. Organizations should prioritize this upgrade, especially those hosting multiple organizations on a single Zulip instance. Additionally, administrators should audit existing invitations and revoke any that may have been issued with elevated permissions or to untrusted parties. Implementing strict monitoring and logging of invitation usage and organization membership changes can help detect suspicious activity. Where possible, segregate organizations onto separate Zulip Server instances to reduce risk exposure. Review and tighten role-based access controls to minimize the impact of any unauthorized access. Finally, educate administrators and users about the risks of sharing invitation links and enforce policies to limit invitation distribution.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2021-11-16T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9842c4522896dcbf245c

Added to database: 5/21/2025, 9:09:22 AM

Last enriched: 6/23/2025, 5:32:41 PM

Last updated: 7/26/2025, 10:03:32 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats