CVE-2025-47930: CWE-863: Incorrect Authorization in zulip zulip
Zulip is an open-source team chat application. Starting in version 10.0 and prior to version 10.3, the "Who can create public channels" access control mechanism can be circumvented by creating a private or web-public channel, and then changing the channel privacy to public. A similar technique works for creating private channels without permission, though such a process requires either the API or modifying the HTML, as we do mark the "private" radio button as disabled in such cases. Version 10.3 contains a patch.
AI Analysis
Technical Summary
CVE-2025-47930 is a medium-severity authorization vulnerability affecting versions 10.0 up to but not including 10.3 of Zulip, an open-source team chat application. The flaw lies in the access control mechanism governing who can create public channels. Normally, Zulip restricts the creation of public channels to authorized users only. However, this vulnerability allows an attacker with limited privileges to circumvent these restrictions by first creating a private or web-public channel and then changing its privacy setting to public. This bypasses the intended access control checks. A similar bypass exists for creating private channels without permission, but it requires either interacting with the Zulip API directly or manipulating the HTML elements, as the private channel option is disabled in the user interface for unauthorized users. The vulnerability is classified under CWE-863 (Incorrect Authorization), indicating that the system does not properly enforce authorization policies. The CVSS 4.0 base score is 5.3, reflecting a medium severity level, with network attack vector, low attack complexity, no user interaction, and requiring low privileges. No known exploits are reported in the wild as of the publication date, and version 10.3 contains a patch that addresses this issue. The vulnerability could allow unauthorized users to create public or private channels, potentially leading to information disclosure or unauthorized communication channels within an organization.
Potential Impact
For European organizations using affected Zulip versions, this vulnerability could lead to unauthorized creation of public or private channels, undermining internal communication controls. Unauthorized public channels might expose sensitive discussions to unintended audiences if channel membership is not properly managed. Similarly, unauthorized private channels could be used to create hidden communication paths, complicating monitoring and compliance efforts. This could impact confidentiality and integrity of communications, especially in regulated industries such as finance, healthcare, or government sectors prevalent in Europe. The ability to bypass access controls without user interaction and with low privileges increases the risk of insider threats or compromised accounts exploiting this flaw. While availability impact is minimal, the breach of access control policies can lead to regulatory compliance issues under GDPR and other European data protection laws, potentially resulting in legal and reputational damage.
Mitigation Recommendations
European organizations should promptly upgrade all Zulip instances to version 10.3 or later, where the vulnerability is patched. Until upgrades are completed, administrators should restrict channel creation permissions to trusted users only and monitor channel creation logs for suspicious activity. Implementing strict API access controls and auditing API usage can help detect attempts to exploit the vulnerability via API or HTML manipulation. Additionally, organizations should enforce multi-factor authentication and strong account security to reduce the risk of compromised accounts being used to exploit this flaw. Regular security training to raise awareness about unauthorized channel creation and periodic reviews of channel memberships and permissions can further mitigate risks. Network segmentation and monitoring of Zulip server traffic for anomalous behavior may also provide early detection of exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-47930: CWE-863: Incorrect Authorization in zulip zulip
Description
Zulip is an open-source team chat application. Starting in version 10.0 and prior to version 10.3, the "Who can create public channels" access control mechanism can be circumvented by creating a private or web-public channel, and then changing the channel privacy to public. A similar technique works for creating private channels without permission, though such a process requires either the API or modifying the HTML, as we do mark the "private" radio button as disabled in such cases. Version 10.3 contains a patch.
AI-Powered Analysis
Technical Analysis
CVE-2025-47930 is a medium-severity authorization vulnerability affecting versions 10.0 up to but not including 10.3 of Zulip, an open-source team chat application. The flaw lies in the access control mechanism governing who can create public channels. Normally, Zulip restricts the creation of public channels to authorized users only. However, this vulnerability allows an attacker with limited privileges to circumvent these restrictions by first creating a private or web-public channel and then changing its privacy setting to public. This bypasses the intended access control checks. A similar bypass exists for creating private channels without permission, but it requires either interacting with the Zulip API directly or manipulating the HTML elements, as the private channel option is disabled in the user interface for unauthorized users. The vulnerability is classified under CWE-863 (Incorrect Authorization), indicating that the system does not properly enforce authorization policies. The CVSS 4.0 base score is 5.3, reflecting a medium severity level, with network attack vector, low attack complexity, no user interaction, and requiring low privileges. No known exploits are reported in the wild as of the publication date, and version 10.3 contains a patch that addresses this issue. The vulnerability could allow unauthorized users to create public or private channels, potentially leading to information disclosure or unauthorized communication channels within an organization.
Potential Impact
For European organizations using affected Zulip versions, this vulnerability could lead to unauthorized creation of public or private channels, undermining internal communication controls. Unauthorized public channels might expose sensitive discussions to unintended audiences if channel membership is not properly managed. Similarly, unauthorized private channels could be used to create hidden communication paths, complicating monitoring and compliance efforts. This could impact confidentiality and integrity of communications, especially in regulated industries such as finance, healthcare, or government sectors prevalent in Europe. The ability to bypass access controls without user interaction and with low privileges increases the risk of insider threats or compromised accounts exploiting this flaw. While availability impact is minimal, the breach of access control policies can lead to regulatory compliance issues under GDPR and other European data protection laws, potentially resulting in legal and reputational damage.
Mitigation Recommendations
European organizations should promptly upgrade all Zulip instances to version 10.3 or later, where the vulnerability is patched. Until upgrades are completed, administrators should restrict channel creation permissions to trusted users only and monitor channel creation logs for suspicious activity. Implementing strict API access controls and auditing API usage can help detect attempts to exploit the vulnerability via API or HTML manipulation. Additionally, organizations should enforce multi-factor authentication and strong account security to reduce the risk of compromised accounts being used to exploit this flaw. Regular security training to raise awareness about unauthorized channel creation and periodic reviews of channel memberships and permissions can further mitigate risks. Network segmentation and monitoring of Zulip server traffic for anomalous behavior may also provide early detection of exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-05-14T10:32:43.529Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682cd0fa1484d88663aebef1
Added to database: 5/20/2025, 6:59:06 PM
Last enriched: 7/4/2025, 5:25:04 PM
Last updated: 7/29/2025, 1:54:10 AM
Views: 13
Related Threats
CVE-2025-8985: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumCVE-2025-8984: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8983: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8982: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8981: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.