Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2025-52559
Analyzed
More InfoOfficial Page
Source-security-advisories@github.com
View Known Exploited Vulnerability (KEV) details
Published At-02 Jul, 2025 | 20:15
Updated At-27 Aug, 2025 | 13:37

Zulip is an open-source team chat application. From versions 2.0.0-rc1 to before 10.4 in Zulip Server, the /digest/ URL of a server shows a preview of what the email weekly digest would contain. This URL, though not the digest itself, contains a cross-site scripting (XSS) vulnerability in both topic names and channel names. This issue has been fixed in Zulip Server 10.4. A workaround for this issue involves denying access to /digest/.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.16.8MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
Primary3.15.4MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
CPE Matches

Kandra Labs, Inc. (Zulip)
zulip
>>zulip>>Versions from 2.0.1(inclusive) to 10.4(exclusive)
cpe:2.3:a:zulip:zulip:*:*:*:*:*:*:*:*
Kandra Labs, Inc. (Zulip)
zulip
>>zulip>>2.0.0
cpe:2.3:a:zulip:zulip:2.0.0:rc1:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-79Primarysecurity-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/zulip/zulip/commit/175ec1f365b0db982d6eac9019701cbf6e8bc2f2security-advisories@github.com
Patch
https://github.com/zulip/zulip/commit/1a8429e338ff53bdcc4b42e7e71b6fffdd84fcd1security-advisories@github.com
Patch
https://github.com/zulip/zulip/commit/6608c8777254e73a4b540e5e1c4af92e680a55fcsecurity-advisories@github.com
Patch
https://github.com/zulip/zulip/security/advisories/GHSA-vgf2-vw4r-m663security-advisories@github.com
Patch
Vendor Advisory
Change History
0Changes found

Details not found