We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-31478

Zulip Authentication Backend Configuration Bypass



Description

Zulip is an open-source team collaboration tool. Zulip supports a configuration where account creation is limited solely by being able to authenticate with a single-sign on authentication backend, meaning the organization places no restrictions on email address domains or invitations being required to join, but has disabled the EmailAuthBackend that is used for email/password authentication. A bug in the Zulip server means that it is possible to create an account in such organizations, without having an account with the configured SSO authentication backend. This issue is patched in version 10.2. A workaround includes requiring invitations to join the organization prevents the vulnerability from being accessed.

Reserved 2025-03-28 | Published 2025-04-16 | Updated 2025-04-17 | Assigner GitHub_M


HIGH: 8.2CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

Problem types

CWE-287: Improper Authentication

Product status

< 10.2
affected

References

github.com/.../zulip/security/advisories/GHSA-qxfv-j6vg-5rqc

cve.org (CVE-2025-31478)

nvd.nist.gov (CVE-2025-31478)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-31478

Support options

Helpdesk Chat, Email, Knowledgebase