We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-30368

Zulip allows the deletion of organization by administrators of a different organization



Description

Zulip is an open-source team collaboration tool. The API for deleting an organization export is supposed to be restricted to organization administrators, but its handler failed to check that the field belongs to the same organization as the user. Therefore, an administrator of any organization was incorrectly allowed to delete an export of a different organization. This is fixed in Zulip Server 10.1.

Reserved 2025-03-21 | Published 2025-03-31 | Updated 2025-03-31 | Assigner GitHub_M


LOW: 2.7CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-566: Authorization Bypass Through User-Controlled SQL Primary Key

Product status

>= 10.0-beta1, < 10.1
affected

References

github.com/.../zulip/security/advisories/GHSA-rmhr-5ffq-qcrc

github.com/...ommit/07dcee36b2a34d63429d7a706f880628cf3433df

zulip.readthedocs.io/en/latest/overview/changelog.html

cve.org (CVE-2025-30368)

nvd.nist.gov (CVE-2025-30368)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-30368

Support options

Helpdesk Chat, Email, Knowledgebase