{"api_version":"1","generated_at":"2026-04-26T02:51:38+00:00","cve":"CVE-2022-31017","urls":{"html":"https://cve.report/CVE-2022-31017","api":"https://cve.report/api/cve/CVE-2022-31017.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-31017","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-31017"},"summary":{"title":"CVE-2022-31017","description":"Zulip is an open-source team collaboration tool. Versions 2.1.0 through and including 5.2 are vulnerable to a logic error. A stream configured as private with protected history, where new subscribers should not be allowed to see messages sent before they were subscribed, when edited causes the server to incorrectly send an API event that includes the edited message to all of the stream’s current subscribers. This API event is ignored by official clients, but can be observed by using a modified client or the browser’s developer tools. This bug will be fixed in Zulip Server 5.3. There are no known workarounds.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2022-06-25 09:15:00","updated_at":"2022-07-07 18:33:00"},"problem_types":["CWE-571","CWE-670"],"metrics":[],"references":[{"url":"https://github.com/zulip/zulip/security/advisories/GHSA-m5j3-jp59-6f3q","name":"https://github.com/zulip/zulip/security/advisories/GHSA-m5j3-jp59-6f3q","refsource":"CONFIRM","tags":[],"title":"Zulip Server exposes edit events for old messages to new subscribers in protected-history streams · Advisory · zulip/zulip · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-31017","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-31017","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"31017","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"zulip","cpe5":"zulip","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2022-31017","STATE":"PUBLIC","TITLE":"Expression Always True vulnerability in Zulip Server"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"zulip","version":{"version_data":[{"version_value":">= 2.1.0, < 5.3"}]}}]},"vendor_name":"zulip"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Zulip is an open-source team collaboration tool. Versions 2.1.0 through and including 5.2 are vulnerable to a logic error. A stream configured as private with protected history, where new subscribers should not be allowed to see messages sent before they were subscribed, when edited causes the server to incorrectly send an API event that includes the edited message to all of the stream’s current subscribers. This API event is ignored by official clients, but can be observed by using a modified client or the browser’s developer tools. This bug will be fixed in Zulip Server 5.3. There are no known workarounds."}]},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":2,"baseSeverity":"LOW","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-571: Expression is Always True"}]},{"description":[{"lang":"eng","value":"CWE-670: Always-Incorrect Control Flow Implementation"}]}]},"references":{"reference_data":[{"name":"https://github.com/zulip/zulip/security/advisories/GHSA-m5j3-jp59-6f3q","refsource":"CONFIRM","url":"https://github.com/zulip/zulip/security/advisories/GHSA-m5j3-jp59-6f3q"}]},"source":{"advisory":"GHSA-m5j3-jp59-6f3q","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2022-06-25 09:15:00","lastModifiedDate":"2022-07-07 18:33:00","problem_types":["CWE-571","CWE-670"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":2.6,"baseSeverity":"LOW"},"exploitabilityScore":1.2,"impactScore":1.4},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:H/Au:S/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":2.1},"severity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:zulip:zulip:*:*:*:*:*:*:*:*","versionStartIncluding":"2.1.0","versionEndExcluding":"5.3","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}