Description
Zulip is an open source team chat app. The `main` development branch of Zulip Server from June 2021 and later is vulnerable to a cross-site scripting vulnerability on the recent topics page. An attacker could maliciously craft a full name for their account and send messages to a topic with several participants; a victim who then opens an overflow tooltip including this full name on the recent topics page could trigger execution of JavaScript code controlled by the attacker. Users running a Zulip server from the main branch should upgrade from main (2022-03-01 or later) again to deploy this fix.
References (2)
Core 2
Core References
Third Party Advisory x_refsource_confirm
https://github.com/zulip/zulip/security/advisories/GHSA-fc77-h3jc-6mfv
Patch, Third Party Advisory x_refsource_misc
https://github.com/zulip/zulip/commit/e090027adcbf62737d5b1f83a9618a9500a49321
Scores
CVSS v3
4.6
EPSS
0.0032
EPSS Percentile
54.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
Status
published
Products (1)
zulip/zulip_server
2021-06-03 - 2022-03-01
Published
Mar 02, 2022
Tracked Since
Feb 18, 2026