Description
Zulip is an open-source team chat application. From versions 2.0.0-rc1 to before 10.4 in Zulip Server, the /digest/ URL of a server shows a preview of what the email weekly digest would contain. This URL, though not the digest itself, contains a cross-site scripting (XSS) vulnerability in both topic names and channel names. This issue has been fixed in Zulip Server 10.4. A workaround for this issue involves denying access to /digest/.
References (4)
Core 4
Core References
Patch, Vendor Advisory x_refsource_confirm
https://github.com/zulip/zulip/security/advisories/GHSA-vgf2-vw4r-m663
Patch x_refsource_misc
https://github.com/zulip/zulip/commit/175ec1f365b0db982d6eac9019701cbf6e8bc2f2
Patch x_refsource_misc
https://github.com/zulip/zulip/commit/1a8429e338ff53bdcc4b42e7e71b6fffdd84fcd1
Patch x_refsource_misc
https://github.com/zulip/zulip/commit/6608c8777254e73a4b540e5e1c4af92e680a55fc
Scores
CVSS v3
6.8
EPSS
0.0018
EPSS Percentile
39.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
Status
published
Products (2)
zulip/zulip_server
2.0.0 rc1
zulip/zulip_server
2.0.1 - 10.4
Published
Jul 02, 2025
Tracked Since
Feb 18, 2026