Authorization Flaw in Zulip Payment Processing by Zulip
CVE-2026-25741
What is CVE-2026-25741?
Zulip, an open-source team collaboration tool, experienced an authorization flaw in its Cloud payment processing system. Specifically, before the fix implemented in commit bf28c82dc9b1f630fa8e9106358771b20a0040f7, the API endpoint responsible for creating a card update session during the upgrade flow could be accessed by users with only organization member privileges. This oversight allowed standard members, lacking billing-specific authorization, to modify the organization’s payment method upon completion of the associated Stripe Checkout session. Following the patch, self-hosted deployments are no longer vulnerable, while the Cloud version has been secured.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
zulip < bf28c82dc9b1f630fa8e9106358771b20a0040f7
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved
