{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T23:48:59.748","vulnerabilities":[{"cve":{"id":"CVE-2022-23656","sourceIdentifier":"security-advisories@github.com","published":"2022-03-02T21:15:08.160","lastModified":"2024-11-21T06:49:02.063","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Zulip is an open source team chat app. The `main` development branch of Zulip Server from June 2021 and later is vulnerable to a cross-site scripting vulnerability on the recent topics page. An attacker could maliciously craft a full name for their account and send messages to a topic with several participants; a victim who then opens an overflow tooltip including this full name on the recent topics page could trigger execution of JavaScript code controlled by the attacker. Users running a Zulip server from the main branch should upgrade from main (2022-03-01 or later) again to deploy this fix."},{"lang":"es","value":"Zulip es una aplicación de chat en equipo de código abierto. La rama de desarrollo \"main\" de Zulip Server de junio de 2021 y posteriores, es susceptible a una vulnerabilidad de tipo cross-site scripting en la página de temas recientes. Un atacante podría diseñar maliciosamente un nombre completo para su cuenta y enviar mensajes a un tema con varios participantes; una víctima que abra un tooltip de desbordamiento que incluya este nombre completo en la página de temas recientes podría desencadenar una ejecución de código JavaScript controlado por el atacante. Los usuarios que ejecuten un servidor Zulip desde la rama principal deben actualizar desde la principal (01-03-2022 o posterior) de nuevo para implementar esta corrección"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N","baseScore":4.6,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.1,"impactScore":2.5},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","baseScore":3.5,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:zulip:zulip_server:*:*:*:*:*:*:*:*","versionStartIncluding":"2021-06-03","versionEndExcluding":"2022-03-01","matchCriteriaId":"8D1C326D-A865-4460-AB1B-34B96D16B599"}]}]}],"references":[{"url":"https://github.com/zulip/zulip/commit/e090027adcbf62737d5b1f83a9618a9500a49321","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/zulip/zulip/security/advisories/GHSA-fc77-h3jc-6mfv","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/zulip/zulip/commit/e090027adcbf62737d5b1f83a9618a9500a49321","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/zulip/zulip/security/advisories/GHSA-fc77-h3jc-6mfv","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}