Zulip is an open-source team collaboration tool. From version 1.4.0 to before version 11.6, ./manage.py import reads arbitrary files from the server filesystem via path traversal in uploads/records.json. A crafted export tarball causes the server to copy any file the zulip user can read into the uploads directory during import. This issue has been patched in version 11.6.
References
| Link | Resource |
|---|---|
| https://github.com/zulip/zulip/commit/2df49e7750ce3fc49ef1d44b1c4ece654d4b754c | Patch |
| https://github.com/zulip/zulip/security/advisories/GHSA-xm5c-c6mp-3956 | Exploit Vendor Advisory |
Configurations
History
22 Apr 2026, 18:17
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Zulip
Zulip zulip |
|
| References | () https://github.com/zulip/zulip/commit/2df49e7750ce3fc49ef1d44b1c4ece654d4b754c - Patch | |
| References | () https://github.com/zulip/zulip/security/advisories/GHSA-xm5c-c6mp-3956 - Exploit, Vendor Advisory | |
| CPE | cpe:2.3:a:zulip:zulip:*:*:*:*:*:*:*:* |
03 Apr 2026, 21:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-03 21:17
Updated : 2026-04-22 18:17
NVD link : CVE-2026-26058
Mitre link : CVE-2026-26058
CVE.ORG link : CVE-2026-26058
JSON object : View
Products Affected
zulip
- zulip
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
