CVE-2022-35962: CWE-184: Incomplete List of Disallowed Inputs in zulip zulip-mobile
Zulip is an open source team chat and Zulip Mobile is an app for iOS and Andriod users. In Zulip Mobile through version 27.189, a crafted link in a message sent by an authenticated user could lead to credential disclosure if a user follows the link. A patch was released in version 27.190.
AI Analysis
Technical Summary
CVE-2022-35962 is a medium-severity vulnerability affecting Zulip Mobile, an open-source team chat application available on iOS and Android platforms. The vulnerability arises due to an incomplete list of disallowed inputs (CWE-184) and interpretation conflicts (CWE-436) in the handling of crafted links within messages. Specifically, in versions of Zulip Mobile prior to 27.190, an authenticated user can send a specially crafted link in a chat message. If another user clicks on this malicious link, it can lead to the disclosure of credentials. This occurs because the application does not properly sanitize or restrict certain inputs, allowing the crafted link to exploit the app's interpretation logic and bypass security controls. The vulnerability requires the attacker to be an authenticated user who can send messages, and the victim must interact by clicking the malicious link. The issue was addressed and patched in version 27.190 of Zulip Mobile. There are no known exploits in the wild reported to date. The vulnerability impacts confidentiality primarily, as it can lead to credential disclosure, potentially compromising user accounts and access to the Zulip chat environment. The integrity and availability impacts are less direct but could follow from compromised credentials. The vulnerability affects both iOS and Android users of Zulip Mobile prior to the patched version.
Potential Impact
For European organizations using Zulip Mobile for internal communications, this vulnerability poses a risk of credential theft, which can lead to unauthorized access to sensitive corporate communications and data. Given that Zulip is an open-source platform often used by tech-savvy teams and organizations valuing open-source solutions, the impact could be significant in sectors such as technology, finance, and government agencies that rely on secure team collaboration tools. Credential disclosure can facilitate lateral movement within networks, data exfiltration, and espionage. The requirement for user interaction (clicking a malicious link) means that social engineering or phishing tactics could be employed by attackers. Although no exploits are known in the wild, the presence of this vulnerability in widely used mobile apps increases the attack surface, especially as mobile devices are often less protected than desktops. The impact is heightened in environments where multi-factor authentication is not enforced or where users reuse passwords across services. The vulnerability could also undermine trust in the communication platform, affecting organizational productivity and security posture.
Mitigation Recommendations
1. Immediate upgrade: Organizations should ensure all Zulip Mobile clients are updated to version 27.190 or later to apply the official patch addressing this vulnerability. 2. User education: Train users to be cautious about clicking links in messages, even from authenticated users, emphasizing verification of unexpected or suspicious links. 3. Implement multi-factor authentication (MFA): Enforce MFA on Zulip accounts to reduce the risk of credential misuse if disclosure occurs. 4. Network monitoring: Deploy monitoring for unusual access patterns or login attempts that could indicate compromised credentials. 5. Application whitelisting and sandboxing: On managed mobile devices, restrict installation of unauthorized apps and isolate Zulip Mobile to limit potential damage. 6. Link scanning: Integrate URL scanning solutions or proxies that can detect and block malicious links before they reach end users. 7. Incident response readiness: Prepare to respond to potential credential compromise incidents by having procedures for rapid password resets and account lockouts. 8. Encourage use of password managers to avoid password reuse and improve credential hygiene.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Denmark, Ireland
CVE-2022-35962: CWE-184: Incomplete List of Disallowed Inputs in zulip zulip-mobile
Description
Zulip is an open source team chat and Zulip Mobile is an app for iOS and Andriod users. In Zulip Mobile through version 27.189, a crafted link in a message sent by an authenticated user could lead to credential disclosure if a user follows the link. A patch was released in version 27.190.
AI-Powered Analysis
Technical Analysis
CVE-2022-35962 is a medium-severity vulnerability affecting Zulip Mobile, an open-source team chat application available on iOS and Android platforms. The vulnerability arises due to an incomplete list of disallowed inputs (CWE-184) and interpretation conflicts (CWE-436) in the handling of crafted links within messages. Specifically, in versions of Zulip Mobile prior to 27.190, an authenticated user can send a specially crafted link in a chat message. If another user clicks on this malicious link, it can lead to the disclosure of credentials. This occurs because the application does not properly sanitize or restrict certain inputs, allowing the crafted link to exploit the app's interpretation logic and bypass security controls. The vulnerability requires the attacker to be an authenticated user who can send messages, and the victim must interact by clicking the malicious link. The issue was addressed and patched in version 27.190 of Zulip Mobile. There are no known exploits in the wild reported to date. The vulnerability impacts confidentiality primarily, as it can lead to credential disclosure, potentially compromising user accounts and access to the Zulip chat environment. The integrity and availability impacts are less direct but could follow from compromised credentials. The vulnerability affects both iOS and Android users of Zulip Mobile prior to the patched version.
Potential Impact
For European organizations using Zulip Mobile for internal communications, this vulnerability poses a risk of credential theft, which can lead to unauthorized access to sensitive corporate communications and data. Given that Zulip is an open-source platform often used by tech-savvy teams and organizations valuing open-source solutions, the impact could be significant in sectors such as technology, finance, and government agencies that rely on secure team collaboration tools. Credential disclosure can facilitate lateral movement within networks, data exfiltration, and espionage. The requirement for user interaction (clicking a malicious link) means that social engineering or phishing tactics could be employed by attackers. Although no exploits are known in the wild, the presence of this vulnerability in widely used mobile apps increases the attack surface, especially as mobile devices are often less protected than desktops. The impact is heightened in environments where multi-factor authentication is not enforced or where users reuse passwords across services. The vulnerability could also undermine trust in the communication platform, affecting organizational productivity and security posture.
Mitigation Recommendations
1. Immediate upgrade: Organizations should ensure all Zulip Mobile clients are updated to version 27.190 or later to apply the official patch addressing this vulnerability. 2. User education: Train users to be cautious about clicking links in messages, even from authenticated users, emphasizing verification of unexpected or suspicious links. 3. Implement multi-factor authentication (MFA): Enforce MFA on Zulip accounts to reduce the risk of credential misuse if disclosure occurs. 4. Network monitoring: Deploy monitoring for unusual access patterns or login attempts that could indicate compromised credentials. 5. Application whitelisting and sandboxing: On managed mobile devices, restrict installation of unauthorized apps and isolate Zulip Mobile to limit potential damage. 6. Link scanning: Integrate URL scanning solutions or proxies that can detect and block malicious links before they reach end users. 7. Incident response readiness: Prepare to respond to potential credential compromise incidents by having procedures for rapid password resets and account lockouts. 8. Encourage use of password managers to avoid password reuse and improve credential hygiene.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-07-15T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9844c4522896dcbf3b5d
Added to database: 5/21/2025, 9:09:24 AM
Last enriched: 6/22/2025, 11:49:58 PM
Last updated: 7/31/2025, 1:41:21 PM
Views: 10
Related Threats
CVE-2025-55159: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in tokio-rs slab
MediumCVE-2025-55161: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-25235: CWE-918 Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway
HighCVE-2025-55151: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-55150: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.