CVE-2022-21706: CWE-863: Incorrect Authorization in zulip zulip
Zulip is an open-source team collaboration tool with topic-based threading. Zulip Server version 2.0.0 and above are vulnerable to insufficient access control with multi-use invitations. A Zulip Server deployment which hosts multiple organizations is vulnerable to an attack where an invitation created in one organization (potentially as a role with elevated permissions) can be used to join any other organization. This bypasses any restrictions on required domains on users' email addresses, may be used to gain access to organizations which are only accessible by invitation, and may be used to gain access with elevated privileges. This issue has been patched in release 4.10. There are no known workarounds for this issue. ### Patches _Has the problem been patched? What versions should users upgrade to?_ ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ ### References _Are there any links users can visit to find out more?_ ### For more information If you have any questions or comments about this advisory, you can discuss them on the [developer community Zulip server](https://zulip.com/developer-community/), or email the [Zulip security team](mailto:security@zulip.com).
AI Analysis
Technical Summary
CVE-2022-21706 is a security vulnerability affecting Zulip Server, an open-source team collaboration platform known for its topic-based threading. The vulnerability exists in Zulip Server versions 2.0.0 up to but not including 4.10. It arises from insufficient access control related to multi-use invitations in deployments hosting multiple organizations. Specifically, an invitation generated within one organization—potentially granting elevated permissions—can be exploited to join any other organization hosted on the same Zulip Server instance. This bypasses domain-based restrictions on user email addresses and invitation-only access controls. Consequently, an attacker can gain unauthorized access to organizations they should not be able to join, possibly with elevated privileges if the invitation role is privileged. The vulnerability is classified under CWE-863 (Incorrect Authorization) and CWE-284 (Improper Access Control). The issue has been addressed and patched in Zulip Server version 4.10. No known workarounds exist, so upgrading is the primary remediation. There are no known exploits in the wild at this time. The vulnerability impacts the confidentiality and integrity of organizational data by allowing unauthorized access and privilege escalation within multi-tenant Zulip Server deployments. Exploitation requires no user interaction beyond using the invitation link, and authentication is effectively bypassed by the invitation misuse. The scope is limited to Zulip Server instances hosting multiple organizations, which is a common deployment scenario for enterprises and institutions using Zulip for internal collaboration.
Potential Impact
For European organizations using Zulip Server in multi-organization deployments, this vulnerability poses a significant risk to data confidentiality and organizational integrity. Unauthorized access to sensitive communications, documents, and collaboration channels can lead to data leakage, intellectual property theft, or insider threat scenarios. Elevated privileges gained through invitation misuse could allow attackers to modify or delete critical information, disrupt workflows, or impersonate legitimate users. Organizations relying on domain-based restrictions to segregate access between different business units or partners will find these controls ineffective against this vulnerability. The absence of known exploits reduces immediate risk, but the potential for targeted attacks remains, especially against organizations with sensitive or regulated data. This vulnerability could also undermine trust in collaboration platforms and complicate compliance with data protection regulations such as GDPR, given the unauthorized cross-organization data access it enables.
Mitigation Recommendations
The primary and only effective mitigation is to upgrade all Zulip Server deployments to version 4.10 or later, where the vulnerability is patched. Organizations should prioritize this upgrade, especially those hosting multiple organizations on a single Zulip instance. Additionally, administrators should audit existing invitations and revoke any that may have been issued with elevated permissions or to untrusted parties. Implementing strict monitoring and logging of invitation usage and organization membership changes can help detect suspicious activity. Where possible, segregate organizations onto separate Zulip Server instances to reduce risk exposure. Review and tighten role-based access controls to minimize the impact of any unauthorized access. Finally, educate administrators and users about the risks of sharing invitation links and enforce policies to limit invitation distribution.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Denmark
CVE-2022-21706: CWE-863: Incorrect Authorization in zulip zulip
Description
Zulip is an open-source team collaboration tool with topic-based threading. Zulip Server version 2.0.0 and above are vulnerable to insufficient access control with multi-use invitations. A Zulip Server deployment which hosts multiple organizations is vulnerable to an attack where an invitation created in one organization (potentially as a role with elevated permissions) can be used to join any other organization. This bypasses any restrictions on required domains on users' email addresses, may be used to gain access to organizations which are only accessible by invitation, and may be used to gain access with elevated privileges. This issue has been patched in release 4.10. There are no known workarounds for this issue. ### Patches _Has the problem been patched? What versions should users upgrade to?_ ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ ### References _Are there any links users can visit to find out more?_ ### For more information If you have any questions or comments about this advisory, you can discuss them on the [developer community Zulip server](https://zulip.com/developer-community/), or email the [Zulip security team](mailto:security@zulip.com).
AI-Powered Analysis
Technical Analysis
CVE-2022-21706 is a security vulnerability affecting Zulip Server, an open-source team collaboration platform known for its topic-based threading. The vulnerability exists in Zulip Server versions 2.0.0 up to but not including 4.10. It arises from insufficient access control related to multi-use invitations in deployments hosting multiple organizations. Specifically, an invitation generated within one organization—potentially granting elevated permissions—can be exploited to join any other organization hosted on the same Zulip Server instance. This bypasses domain-based restrictions on user email addresses and invitation-only access controls. Consequently, an attacker can gain unauthorized access to organizations they should not be able to join, possibly with elevated privileges if the invitation role is privileged. The vulnerability is classified under CWE-863 (Incorrect Authorization) and CWE-284 (Improper Access Control). The issue has been addressed and patched in Zulip Server version 4.10. No known workarounds exist, so upgrading is the primary remediation. There are no known exploits in the wild at this time. The vulnerability impacts the confidentiality and integrity of organizational data by allowing unauthorized access and privilege escalation within multi-tenant Zulip Server deployments. Exploitation requires no user interaction beyond using the invitation link, and authentication is effectively bypassed by the invitation misuse. The scope is limited to Zulip Server instances hosting multiple organizations, which is a common deployment scenario for enterprises and institutions using Zulip for internal collaboration.
Potential Impact
For European organizations using Zulip Server in multi-organization deployments, this vulnerability poses a significant risk to data confidentiality and organizational integrity. Unauthorized access to sensitive communications, documents, and collaboration channels can lead to data leakage, intellectual property theft, or insider threat scenarios. Elevated privileges gained through invitation misuse could allow attackers to modify or delete critical information, disrupt workflows, or impersonate legitimate users. Organizations relying on domain-based restrictions to segregate access between different business units or partners will find these controls ineffective against this vulnerability. The absence of known exploits reduces immediate risk, but the potential for targeted attacks remains, especially against organizations with sensitive or regulated data. This vulnerability could also undermine trust in collaboration platforms and complicate compliance with data protection regulations such as GDPR, given the unauthorized cross-organization data access it enables.
Mitigation Recommendations
The primary and only effective mitigation is to upgrade all Zulip Server deployments to version 4.10 or later, where the vulnerability is patched. Organizations should prioritize this upgrade, especially those hosting multiple organizations on a single Zulip instance. Additionally, administrators should audit existing invitations and revoke any that may have been issued with elevated permissions or to untrusted parties. Implementing strict monitoring and logging of invitation usage and organization membership changes can help detect suspicious activity. Where possible, segregate organizations onto separate Zulip Server instances to reduce risk exposure. Review and tighten role-based access controls to minimize the impact of any unauthorized access. Finally, educate administrators and users about the risks of sharing invitation links and enforce policies to limit invitation distribution.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2021-11-16T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9842c4522896dcbf245c
Added to database: 5/21/2025, 9:09:22 AM
Last enriched: 6/23/2025, 5:32:41 PM
Last updated: 7/26/2025, 10:03:32 AM
Views: 13
Related Threats
CVE-2025-55161: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-25235: CWE-918 Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway
HighCVE-2025-55151: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-55150: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-54992: CWE-611: Improper Restriction of XML External Entity Reference in telstra open-kilda
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.