Vulnerability Description
Zulip is an open-source team collaboration tool. The API for deleting an organization export is supposed to be restricted to organization administrators, but its handler failed to check that the field belongs to the same organization as the user. Therefore, an administrator of any organization was incorrectly allowed to delete an export of a different organization. This is fixed in Zulip Server 10.1.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zulip | Zulip | 10.0 |
Related Weaknesses (CWE)
References
- https://github.com/zulip/zulip/commit/07dcee36b2a34d63429d7a706f880628cf3433dfPatch
- https://github.com/zulip/zulip/security/advisories/GHSA-rmhr-5ffq-qcrcPatchThird Party Advisory
- https://zulip.readthedocs.io/en/latest/overview/changelog.html#zulip-server-10-1Release Notes
FAQ
What is CVE-2025-30368?
CVE-2025-30368 is a vulnerability with a CVSS score of 2.7 (LOW). Zulip is an open-source team collaboration tool. The API for deleting an organization export is supposed to be restricted to organization administrators, but its handler failed to check that the field...
How severe is CVE-2025-30368?
CVE-2025-30368 has been rated LOW with a CVSS base score of 2.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-30368?
Check the references section above for vendor advisories and patch information. Affected products include: Zulip Zulip.