Description
Nextcloud Server is a self hosted personal cloud system. After setting up a user or administrator defined external storage with fixed credentials, the API returns them and adds them into the frontend again, allowing to read them in plain text when an attacker already has access to an active session of a user. It is recommended that the Nextcloud Server is upgraded to 28.0.12, 29.0.9 or 30.0.2 and Nextcloud Enterprise Server is upgraded to 25.0.13.14, 26.0.13.10, 27.1.11.10, 28.0.12, 29.0.9 or 30.0.2.
CVSS Metrics
- Vector
- CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N
- Attack Vector
- physical
- Complexity
- high
- Privileges
- high
- User Action
- required
- Scope
- changed
- Confidentiality
- high
- Integrity
- none
- Availability
- none
- Weaknesses
- CWE-200CWE-125
Metadata
- Primary Vendor
- NEXTCLOUD
- Published
- 11/15/2024
- Last Modified
- 10/1/2025
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
nextcloud : nextcloud_servernextcloud : nextcloud_servernextcloud : nextcloud_servernextcloud : nextcloud_servernextcloud : nextcloud_servernextcloud : nextcloud_servernextcloud : nextcloud_servernextcloud : nextcloud_servernextcloud : nextcloud_server
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.