Description
Zulip is an open-source team collaboration tool with unique topic-based threading that combines the best of email and chat to make remote work productive and delightful. The main development branch of Zulip Server from May 2, 2023 and later, including beta versions 7.0-beta1 and 7.0-beta2, is vulnerable to a cross-site scripting vulnerability in tooltips on the message feed. An attacker who can send messages could maliciously craft a topic for the message, such that a victim who hovers the tooltip for that topic in their message feed triggers execution of JavaScript code controlled by the attacker.
References (4)
Core 4
Core References
Vendor Advisory x_refsource_confirm
https://github.com/zulip/zulip/security/advisories/GHSA-4r83-8f94-hrph
Issue Tracking, Patch x_refsource_misc
https://github.com/zulip/zulip/pull/25370
Patch x_refsource_misc
https://github.com/zulip/zulip/commit/03cfb3d9fe61c975d133121ec31a7357f0c9e18f
Patch x_refsource_misc
https://github.com/zulip/zulip/commit/3ca131743b00f42bad8edbac4ef92656d954c629
Scores
CVSS v3
8.2
EPSS
0.0034
EPSS Percentile
56.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
Status
published
Products (1)
zulip/zulip_server
7.0 beta1 (2 CPE variants)
Published
May 30, 2023
Tracked Since
Feb 18, 2026