Unrated severityNVD Advisory· Published Aug 31, 2022· Updated Apr 23, 2025
IP address leak via image proxy bypass in Zulip Server
CVE-2022-36048
Description
Zulip is an open-source team collaboration tool with topic-based threading that combines email and chat. When displaying messages with embedded remote images, Zulip normally loads the image preview via a go-camo proxy server. However, an attacker who can send messages could include a crafted URL that tricks the server into embedding a remote image reference directly. This could allow the attacker to infer the viewer’s IP address and browser fingerprinting information. This vulnerability is fixed in Zulip Server 5.6. Zulip organizations with image and link previews disabled are not affected.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- github.com/zulip/zulip/security/advisories/GHSA-vg5m-mf9x-j452mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.