Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2026-25742
Analyzed
More InfoOfficial Page
Source-security-advisories@github.com
View Known Exploited Vulnerability (KEV) details
Published At-03 Apr, 2026 | 21:17
Updated At-13 Apr, 2026 | 18:07

Zulip is an open-source team collaboration tool. Prior to version 11.6, Zulip is an open-source team collaboration tool. From version 1.4.0 to before version 11.6, even after spectator access (enable_spectator_access / WEB_PUBLIC_STREAMS_ENABLED) is disabled, attachments originating from web-public streams can still be retrieved anonymously. As a result, file contents remain accessible even after public access is intended to be disabled. Similarly, even after spectator access is disabled, the /users/me/<stream_id>/topics endpoint remains reachable anonymously, allowing retrieval of topic history for web-public streams. This issue has been patched in version 11.6. This issue has been patched in version 11.6.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.15.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CPE Matches

Kandra Labs, Inc. (Zulip)
zulip
>>zulip>>Versions from 1.4.0(inclusive) to 11.6(exclusive)
cpe:2.3:a:zulip:zulip:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-862Secondarysecurity-advisories@github.com
CWE ID: CWE-862
Type: Secondary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/zulip/zulip/commit/3c045414299680b9f5dca7d76cf6cef6121c0236security-advisories@github.com
Patch
https://github.com/zulip/zulip/commit/41e23347b5218b3b0397a55176c7d97396735baesecurity-advisories@github.com
Patch
https://github.com/zulip/zulip/releases/tag/11.6security-advisories@github.com
Release Notes
https://github.com/zulip/zulip/security/advisories/GHSA-f47p-xjqq-g28wsecurity-advisories@github.com
Exploit
Vendor Advisory
https://github.com/zulip/zulip/security/advisories/GHSA-f47p-xjqq-g28w134c704f-9b21-4f2e-91b3-4a467353bcc0
Exploit
Vendor Advisory
Hyperlink: https://github.com/zulip/zulip/commit/3c045414299680b9f5dca7d76cf6cef6121c0236
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/zulip/zulip/commit/41e23347b5218b3b0397a55176c7d97396735bae
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/zulip/zulip/releases/tag/11.6
Source: security-advisories@github.com
Resource:
Release Notes
Hyperlink: https://github.com/zulip/zulip/security/advisories/GHSA-f47p-xjqq-g28w
Source: security-advisories@github.com
Resource:
Exploit
Vendor Advisory
Hyperlink: https://github.com/zulip/zulip/security/advisories/GHSA-f47p-xjqq-g28w
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Resource:
Exploit
Vendor Advisory
Change History
0Changes found

Details not found