{"uuid": "db0e9846-48d5-4887-829d-2919de3e1f76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "GHSA-RQG7-XFQG-V7Q5", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16585", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47930\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: Zulip is an open-source team chat application. Starting in version 10.0 and prior to version 10.3, the \"Who can create public channels\" access control mechanism can be circumvented by creating a private or web-public channel, and then changing the channel privacy to public. A similar technique works for creating private channels without permission, though such a process requires either the API or modifying the HTML, as we do mark the \"private\" radio button as disabled in such cases. Version 10.3 contains a patch.\n\ud83d\udccf Published: 2025-05-15T23:17:29.829Z\n\ud83d\udccf Modified: 2025-05-15T23:17:29.829Z\n\ud83d\udd17 References:\n1. https://github.com/zulip/zulip/security/advisories/GHSA-rqg7-xfqg-v7q5\n2. https://github.com/zulip/zulip/commit/d2ff4bda4c3efa30fc3ab1f151255cfdbf370f78\n3. https://zulip.com/help/configure-who-can-create-channels\n4. https://zulip.readthedocs.io/en/latest/overview/changelog.html#zulip-server-10-3", "creation_timestamp": "2025-05-15T23:36:28.000000Z"}