Tim Abbott

3 exploits Active since Mar 2017
CVE-2017-0881 WRITEUP MEDIUM WRITEUP
Zulip <1.4.3 - Privilege Escalation
An error in the implementation of an autosubscribe feature in the check_stream_exists route of the Zulip group chat application server before 1.4.3 allowed an authenticated user to subscribe to a private stream that should have required an invitation from an existing member to join. The issue affects all previously released versions of the Zulip server.
CVSS 4.3
CVE-2017-0896 WRITEUP MEDIUM WRITEUP
Zulip Server <1.5.1 - Privilege Escalation
Zulip Server 1.5.1 and below suffer from an error in the implementation of the invite_by_admins_only setting in the Zulip group chat application server that allowed an authenticated user to invite other users to join a Zulip organization even if the organization was configured to prevent this.
CVSS 6.5
CVE-2025-31478 WRITEUP HIGH WRITEUP
Zulip Server < 10.2 - Authentication Bypass
Zulip is an open-source team collaboration tool. Zulip supports a configuration where account creation is limited solely by being able to authenticate with a single-sign on authentication backend, meaning the organization places no restrictions on email address domains or invitations being required to join, but has disabled the EmailAuthBackend that is used for email/password authentication. A bug in the Zulip server means that it is possible to create an account in such organizations, without having an account with the configured SSO authentication backend. This issue is patched in version 10.2. A workaround includes requiring invitations to join the organization prevents the vulnerability from being accessed.
CVSS 8.2