Zulip is an open-source team collaboration tool. From 5.0 to before 11.5, some administrative actions on the user profile were susceptible to stored XSS in group names or channel names. Exploiting these vulnerabilities required the user explicitly interacting with the problematic object. This vulnerability is fixed in 11.5.
References
Configurations
History
23 Feb 2026, 20:48
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
| References | () https://github.com/zulip/zulip/commit/e6093d9e4788f4d82236d856c5ed7b16767886a7 - Patch | |
| References | () https://github.com/zulip/zulip/releases/tag/11.5 - Release Notes | |
| References | () https://github.com/zulip/zulip/security/advisories/GHSA-56qv-8823-6fq9 - Vendor Advisory | |
| References | () https://zulip.readthedocs.io/en/latest/overview/changelog.html#zulip-server-11-5 - Release Notes | |
| First Time |
Zulip zulip Server
Zulip |
|
| CPE | cpe:2.3:a:zulip:zulip_server:*:*:*:*:*:*:*:* |
06 Feb 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-06 19:16
Updated : 2026-02-23 20:48
NVD link : CVE-2026-24050
Mitre link : CVE-2026-24050
CVE.ORG link : CVE-2026-24050
JSON object : View
Products Affected
zulip
- zulip_server
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
