Zulip Zulip

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in any Zulip product.

RSS Feeds for Zulip security vulnerabilities

Create a CVE RSS feed including security vulnerabilities found in Zulip products with stack.watch. Just hit watch, then grab your custom RSS feed url.

Products by Zulip Sorted by Most Security Vulnerabilities since 2018

Zulip32 vulnerabilities

Zulip Server32 vulnerabilities

By the Year

In 2026 there have been 4 vulnerabilities in Zulip with an average score of 6.2 out of ten. Last year, in 2025 Zulip had 8 security vulnerabilities published. If vulnerabilities keep coming in at the current rate, it appears that number of security vulnerabilities in Zulip in 2026 could surpass last years number. Last year, the average CVE base score was greater by 2.03




Year Vulnerabilities Average Score
2026 4 6.17
2025 8 8.20
2024 5 4.30
2023 6 4.72
2022 14 6.38
2021 6 4.73
2020 7 7.23
2019 4 5.95
2018 4 5.93

It may take a day or so for new Zulip vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Zulip Security Vulnerabilities

CVE Date Vulnerability Products
CVE-2026-26058 Apr 03, 2026
Zulip 1.4.011.5 Path Traversal in ./manage.py import (uploads/records.json) Zulip is an open-source team collaboration tool. From version 1.4.0 to before version 11.6, ./manage.py import reads arbitrary files from the server filesystem via path traversal in uploads/records.json. A crafted export tarball causes the server to copy any file the zulip user can read into the uploads directory during import. This issue has been patched in version 11.6.
Zulip
CVE-2026-25742 Apr 03, 2026
Zulip Before 11.6 Allow Anonymous Retrieval of Public Stream Attachments Zulip is an open-source team collaboration tool. Prior to version 11.6, Zulip is an open-source team collaboration tool. From version 1.4.0 to before version 11.6, even after spectator access (enable_spectator_access / WEB_PUBLIC_STREAMS_ENABLED) is disabled, attachments originating from web-public streams can still be retrieved anonymously. As a result, file contents remain accessible even after public access is intended to be disabled. Similarly, even after spectator access is disabled, the /users/me/<stream_id>/topics endpoint remains reachable anonymously, allowing retrieval of topic history for web-public streams. This issue has been patched in version 11.6. This issue has been patched in version 11.6.
Zulip
CVE-2026-25741 Feb 26, 2026
Zulip Cloud: Unchecked Auth on Card Update API Lets Users Change Org Payment Zulip is an open-source team collaboration tool. Prior to commit bf28c82dc9b1f630fa8e9106358771b20a0040f7, the API endpoint for creating a card update session during an upgrade flow was accessible to users with only organization member privileges. When the associated Stripe Checkout session is completed, the Stripe webhook updates the organizations default payment method. Because no billing-specific authorization check is enforced, a regular (non-billing) member can change the organizations payment method. This vulnerability affected the Zulip Cloud payment processing system, and has been patched as of commit bf28c82dc9b1f630fa8e9106358771b20a0040f7. Self-hosted deploys are no longer affected and no patch or upgrade is required for them.
Zulip
CVE-2026-24050 Feb 06, 2026
Zulip <=11.4 XSS in Group/Channel Names via Admin Actions Zulip is an open-source team collaboration tool. From 5.0 to before 11.5, some administrative actions on the user profile were susceptible to stored XSS in group names or channel names. Exploiting these vulnerabilities required the user explicitly interacting with the problematic object. This vulnerability is fixed in 11.5.
Zulip
CVE-2025-52559 Jul 02, 2025
Zulip Server XSS in /digest/ URL (v2.0.0-rc1 - <10.4) Zulip is an open-source team chat application. From versions 2.0.0-rc1 to before 10.4 in Zulip Server, the /digest/ URL of a server shows a preview of what the email weekly digest would contain. This URL, though not the digest itself, contains a cross-site scripting (XSS) vulnerability in both topic names and channel names. This issue has been fixed in Zulip Server 10.4. A workaround for this issue involves denying access to /digest/.
Zulip Server
CVE-2025-47930 May 16, 2025
Zulip 10.0-10.3 Public Channel Creation Bypass @CVE-2025-47930 Zulip is an open-source team chat application. Starting in version 10.0 and prior to version 10.3, the "Who can create public channels" access control mechanism can be circumvented by creating a private or web-public channel, and then changing the channel privacy to public. A similar technique works for creating private channels without permission, though such a process requires either the API or modifying the HTML, as we do mark the "private" radio button as disabled in such cases. Version 10.3 contains a patch.
Zulip
CVE-2025-31478 Apr 16, 2025
Zulip pre-10.2 CVE-2025-31478: Unrestricted Account Creation via SSO Bypass Zulip is an open-source team collaboration tool. Zulip supports a configuration where account creation is limited solely by being able to authenticate with a single-sign on authentication backend, meaning the organization places no restrictions on email address domains or invitations being required to join, but has disabled the EmailAuthBackend that is used for email/password authentication. A bug in the Zulip server means that it is possible to create an account in such organizations, without having an account with the configured SSO authentication backend. This issue is patched in version 10.2. A workaround includes requiring invitations to join the organization prevents the vulnerability from being accessed.
Zulip
CVE-2025-30369 Mar 31, 2025
Zulip 10.1: Org-Admin Cross-Org Delet. Custom Profile Field (CVE-2025-30369) Zulip is an open-source team collaboration tool. The API for deleting an organization custom profile field is supposed to be restricted to organization administrators, but its handler failed to check that the field belongs to the same organization as the user. Therefore, an administrator of any organization was incorrectly allowed to delete custom profile fields belonging to a different organization. This is fixed in Zulip Server 10.1.
Zulip Server
CVE-2025-30368 Mar 31, 2025
Zulip 10.1: Auth Bypass Allows Org Admin to Delete Cross-Org Exports Zulip is an open-source team collaboration tool. The API for deleting an organization export is supposed to be restricted to organization administrators, but its handler failed to check that the field belongs to the same organization as the user. Therefore, an administrator of any organization was incorrectly allowed to delete an export of a different organization. This is fixed in Zulip Server 10.1.
Zulip
CVE-2025-27149 Mar 31, 2025
Zulip Export Feature Exposes Private Data in v9.x Zulip server provides an open-source team chat that helps teams stay productive and focused. Prior to 10.0, the data export to organization administrators feature in Zulip leaks private data. The collection of user-agent types identifying specific integrations or HTTP libraries (E.g., ZulipGitlabWebhook, okhttp, or PycURL) that have been used to access any organization on the server was incorrectly included in all three export types, regardless of if they were used to access the exported organization or not. The "public data" and "with consent" exports metadata including the titles of some topics in private channels which the administrator otherwise did not have access to, and none of the users consented to exporting and metadata for which users were in a group DM together. This vulnerability is fixed in 10.0.
Zulip
Built by Foundeo Inc., with data from the National Vulnerability Database (NVD). Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.