CVE-2025-30368 – Zulip Server Unauthorized Organization Export Deletion

The following table lists the changes that have been made to the
CVE-2025-30368 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Mar. 31, 2025

    Action Type Old Value New Value
    Added Description Zulip is an open-source team collaboration tool. The API for deleting an organization export is supposed to be restricted to organization administrators, but its handler failed to check that the field belongs to the same organization as the user. Therefore, an administrator of any organization was incorrectly allowed to delete an export of a different organization. This is fixed in Zulip Server 10.1.
    Added CVSS V3.1 AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
    Added CWE CWE-566
    Added Reference https://github.com/zulip/zulip/commit/07dcee36b2a34d63429d7a706f880628cf3433df
    Added Reference https://github.com/zulip/zulip/security/advisories/GHSA-rmhr-5ffq-qcrc
    Added Reference https://zulip.readthedocs.io/en/latest/overview/changelog.html#zulip-server-10-1
Share the Post:

Related Posts