HomeNextcloudCVE-2024-52520

CVE-2024-52520

MEDIUM
5.7CVSS
Published: 2024-11-15
Updated: 2025-09-05
AI Analysis

Description

Nextcloud Server is a self hosted personal cloud system. Due to a pre-flighted HEAD request, the link reference provider could be tricked into downloading bigger websites than intended, to find open-graph data. It is recommended that the Nextcloud Server is upgraded to 28.0.10 or 29.0.7 and Nextcloud Enterprise Server is upgraded to 27.1.11.8, 28.0.10 or 29.0.7.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
Attack Vector
network
Complexity
low
Privileges
low
User Action
required
Scope
unchanged
Confidentiality
none
Integrity
none
Availability
high
Weaknesses
CWE-400CWE-79

Metadata

Primary Vendor
NEXTCLOUD
Published
11/15/2024
Last Modified
9/5/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

nextcloud : nextcloud_servernextcloud : nextcloud_servernextcloud : nextcloud_servernextcloud : nextcloud_servernextcloud : nextcloud_server

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2024-52520 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com