CVE-2025-30369
Zulip allows the deletion of Custom profile fields by administrators of a different organization
Severity Score
2.7
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Track
*SSVC
Descriptions
Zulip is an open-source team collaboration tool. The API for deleting an organization custom profile field is supposed to be restricted to organization administrators, but its handler failed to check that the field belongs to the same organization as the user. Therefore, an administrator of any organization was incorrectly allowed to delete custom profile fields belonging to a different organization. This is fixed in Zulip Server 10.1.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Track
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2025-03-21 CVE Reserved
- 2025-03-31 CVE Published
- 2025-03-31 CVE Updated
- 2025-04-06 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-566: Authorization Bypass Through User-Controlled SQL Primary Key
CAPEC
References (1)
URL | Tag | Source |
---|---|---|
https://github.com/zulip/zulip/security/advisories/GHSA-fcgx-q63f-7gw4 | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Zulip Search vendor "Zulip" | Zulip Search vendor "Zulip" for product "Zulip" | >= 1.6.0 < 10.1 Search vendor "Zulip" for product "Zulip" and version " >= 1.6.0 < 10.1" | en |
Affected
|