Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-40300— Zulip: Message edit history visible in "moves only" policy through /api/v1/messages/{id}/history

AI Predicted 5.3 Difficulty: Easy EPSS 0.03% · P9

Possible ATT&CK Techniques 1AI

T1005 · Data from Local System

Affected Version Matrix 1

VendorProductVersion RangeStatus
zulipzulip< 12.0affected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-40300

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Zulip: Message edit history visible in "moves only" policy through /api/v1/messages/{id}/history
Source: NVD (National Vulnerability Database)
Vulnerability Description
Zulip is an open-source team collaboration tool. Prior to 12.0, With message_edit_history_visibility_policy set to "moves", /api/v1/messages/{id}/history still returns historical content values, allowing low-privilege users to recover text that was edited away from other users' messages. This vulnerability is fixed in 12.0.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
访问控制不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Zulip 访问控制错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Zulip是美国Zulip公司的一款功能强大的开源群聊应用程序。用于将实时聊天的即时性与线程对话的生产力优势相结合。 Zulip 12.0之前版本存在访问控制错误漏洞,该漏洞源于当message_edit_history_visibility_policy设置为moves时,/api/v1/messages/{id}/history仍返回历史内容值,可能导致低权限用户恢复其他用户消息中被编辑的文本。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
zulipzulip < 12.0 -

II. Public POCs for CVE-2026-40300

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-40300

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2026-40300

No comments yet


Leave a comment