Description
Zulip is an open source team chat tool. Due to an incorrect authorization check in Zulip Server 5.4 and earlier, a member of an organization could craft an API call that grants organization administrator privileges to one of their bots. The vulnerability is fixed in Zulip Server 5.5. Members who don’t own any bots, and lack permission to create them, can’t exploit the vulnerability. As a workaround for the vulnerability, an organization administrator can restrict the `Who can create bots` permission to administrators only, and change the ownership of existing bots.
References (3)
Core 3
Core References
Third Party Advisory x_refsource_confirm
https://github.com/zulip/zulip/security/advisories/GHSA-c3cp-ggg5-9xw5
Patch, Third Party Advisory x_refsource_misc
https://github.com/zulip/zulip/commit/751b2a03e565e9eb02ffe923b7c24ac73d604034
Release Notes, Third Party Advisory x_refsource_misc
https://github.com/zulip/zulip/releases/tag/5.5
Scores
CVSS v3
5.4
EPSS
0.0029
EPSS Percentile
52.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-285
CWE-863
Status
published
Products (1)
zulip/zulip
< 5.5
Published
Jul 22, 2022
Tracked Since
Feb 18, 2026