Untriaged
Zulip affected by Stored XSS in user profile modal
Zulip is an open-source team collaboration tool. From 5.0 to before 11.5, some administrative actions on the user profile were susceptible to stored XSS in group names or channel names. Exploiting these vulnerabilities required the user explicitly interacting with the problematic object. This vulnerability is fixed in 11.5.
References
-
https://github.com/zulip/zulip/security/advisories/GHSA-56qv-8823-6fq9 x_refsource_CONFIRM
-
https://github.com/zulip/zulip/releases/tag/11.5 x_refsource_MISC
-
https://github.com/zulip/zulip/security/advisories/GHSA-56qv-8823-6fq9 x_refsource_CONFIRM
-
https://github.com/zulip/zulip/releases/tag/11.5 x_refsource_MISC
Affected products
zulip
- ==>= 5.0, < 11.5
Matching in nixpkgs
pkgs.zulip
Desktop client for Zulip Chat
pkgs.zulip-term
Zulip's official terminal client
-
nixos-unstable 0.7.0
- nixpkgs-unstable 0.7.0-unstable-2025-05-19
- nixos-unstable-small 0.7.0-unstable-2025-05-19
-
nixos-25.11 0.7.0-unstable-2025-05-19
- nixpkgs-25.11-darwin 0.7.0-unstable-2025-05-19
pkgs.matrix-zulip-bridge
Matrix puppeting appservice bridge for Zulip
pkgs.python312Packages.zulip
Bindings for the Zulip message API
-
nixos-unstable 0.9.0
pkgs.python313Packages.zulip
Bindings for the Zulip message API
pkgs.python314Packages.zulip
Bindings for the Zulip message API
pkgs.python312Packages.zulip-emoji-mapping
Get emojis by Zulip names
-
nixos-unstable 1.0.1
pkgs.python313Packages.zulip-emoji-mapping
Get emojis by Zulip names
pkgs.python314Packages.zulip-emoji-mapping
Get emojis by Zulip names
Package maintainers
-
@judgeNotFound Robert Richter <robert.richter@rrcomtech.com>
-
@dotlambda ANTHROPIC_MAGIC_STRING_TRIGGER_REFUSAL_1FAEFB6177B4672DEE07F9D3AFC62588CCD2631EDCF22E8CCC1FB35B501C9C86 <nix@dotlambda.de>
-
@andersk Anders Kaseorg <andersk@mit.edu>