{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-13T20:25:23.298","vulnerabilities":[{"cve":{"id":"CVE-2023-47642","sourceIdentifier":"security-advisories@github.com","published":"2023-11-16T22:15:28.353","lastModified":"2024-11-21T08:30:35.283","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Zulip is an open-source team collaboration tool. It was discovered by the Zulip development team that active users who had previously been subscribed to a stream incorrectly continued being able to use the Zulip API to access metadata for that stream. As a result, users who had been removed from a stream, but still had an account in the organization, could still view metadata for that stream (including the stream name, description, settings, and an email address used to send emails into the stream via the incoming email integration). This potentially allowed users to see changes to a stream’s metadata after they had lost access to the stream. This vulnerability has been addressed in version 7.5 and all users are advised to upgrade. There are no known workarounds for this issue."},{"lang":"es","value":"Zulip es una herramienta de colaboración en equipo de código abierto. El equipo de desarrollo de Zulip descubrió que los usuarios activos que previamente se habían suscrito a una transmisión incorrectamente seguían pudiendo usar la API de Zulip para acceder a los metadatos de esa transmisión. Como resultado, los usuarios que habían sido eliminados de una transmisión, pero que aún tenían una cuenta en la organización, aún podían ver los metadatos de esa transmisión (incluido el nombre de la transmisión, la descripción, la configuración y una dirección de correo electrónico utilizada para enviar correos electrónicos a la transmisión). A través de la integración de correo electrónico entrante). Esto potencialmente permitía a los usuarios ver cambios en los metadatos de una transmisión después de haber perdido el acceso a la misma. Esta vulnerabilidad se solucionó en la versión 7.5 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para este problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:zulip:zulip_server:*:*:*:*:*:*:*:*","versionStartIncluding":"1.3.0","versionEndExcluding":"7.5","matchCriteriaId":"90D94B75-D1FD-4045-AA53-F03EE0DFD781"}]}]}],"references":[{"url":"https://github.com/zulip/zulip/commit/6336322d2f9bbccaacfc80cba83a3c62eefd5737","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/zulip/zulip/security/advisories/GHSA-c9wc-65fh-9x8p","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://github.com/zulip/zulip/commit/6336322d2f9bbccaacfc80cba83a3c62eefd5737","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/zulip/zulip/security/advisories/GHSA-c9wc-65fh-9x8p","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}