CVE-2026-26058

Zulip is an open-source team collaboration tool. From version 1.4.0 to before version 11.6, ./manage.py import reads arbitrary files from the server filesystem via path traversal in uploads/records.json. A crafted export tarball causes the server to copy any file the zulip user can read into the uploads directory during import. This issue has been patched in version 11.6.
Configurations

Configuration 1 (hide)

cpe:2.3:a:zulip:zulip:*:*:*:*:*:*:*:*

History

22 Apr 2026, 18:17

Type Values Removed Values Added
First Time Zulip
Zulip zulip
References () https://github.com/zulip/zulip/commit/2df49e7750ce3fc49ef1d44b1c4ece654d4b754c - () https://github.com/zulip/zulip/commit/2df49e7750ce3fc49ef1d44b1c4ece654d4b754c - Patch
References () https://github.com/zulip/zulip/security/advisories/GHSA-xm5c-c6mp-3956 - () https://github.com/zulip/zulip/security/advisories/GHSA-xm5c-c6mp-3956 - Exploit, Vendor Advisory
CPE cpe:2.3:a:zulip:zulip:*:*:*:*:*:*:*:*

03 Apr 2026, 21:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-03 21:17

Updated : 2026-04-22 18:17


NVD link : CVE-2026-26058

Mitre link : CVE-2026-26058

CVE.ORG link : CVE-2026-26058


JSON object : View

Products Affected

zulip

  • zulip
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')