We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-30369

Zulip allows the deletion of Custom profile fields by administrators of a different organization



Description

Zulip is an open-source team collaboration tool. The API for deleting an organization custom profile field is supposed to be restricted to organization administrators, but its handler failed to check that the field belongs to the same organization as the user. Therefore, an administrator of any organization was incorrectly allowed to delete custom profile fields belonging to a different organization. This is fixed in Zulip Server 10.1.

Reserved 2025-03-21 | Published 2025-03-31 | Updated 2025-03-31 | Assigner GitHub_M


LOW: 2.7CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-566: Authorization Bypass Through User-Controlled SQL Primary Key

Product status

>= 1.6.0, < 10.1
affected

References

github.com/.../zulip/security/advisories/GHSA-fcgx-q63f-7gw4

cve.org (CVE-2025-30369)

nvd.nist.gov (CVE-2025-30369)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-30369

Support options

Helpdesk Chat, Email, Knowledgebase