Nextcloud
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Nextcloud.
By the Year
In 2024 there have been 2 vulnerabilities in Nextcloud . Last year Nextcloud had 4 security vulnerabilities published. Right now, Nextcloud is on track to have less security vulnerabilities in 2024 than it did last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2024 | 2 | 0.00 |
2023 | 4 | 4.98 |
2022 | 8 | 4.68 |
2021 | 14 | 6.17 |
2020 | 16 | 5.85 |
2019 | 5 | 6.38 |
2018 | 0 | 0.00 |
It may take a day or so for new Nextcloud vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Nextcloud Security Vulnerabilities
Nextcloud Server: Unauthorized Access to Password-Protected File Attachments
CVE-2024-52513
- November 15, 2024
Nextcloud Server is a self hosted personal cloud system. After receiving a "Files drop" or "Password protected" share link a malicious user was able to download attachments that are referenced in Text files without providing the password. It is recommended that the Nextcloud Server is upgraded to 28.0.11, 29.0.8 or 30.0.1 and Nextcloud Enterprise Server is upgraded to 25.0.13.13, 26.0.13.9, 27.1.11.9, 28.0.11, 29.0.8 or 30.0.1.
Information Disclosure
Nextcloud Server Access Control Bypass Vulnerability
CVE-2024-52514
- November 15, 2024
Nextcloud Server is a self hosted personal cloud system. After a user received a share with some files inside being blocked by the files access control, the user would still be able to copy the intermediate folder inside Nextcloud allowing them to afterwards potentially access the blocked files depending on the user access control rules. It is recommended that the Nextcloud Server is upgraded to 27.1.9, 28.0.5 or 29.0.0 and Nextcloud Enterprise Server is upgraded to 21.0.9.18, 22.2.10.23, 23.0.12.18, 24.0.12.14, 25.0.13.9, 26.0.13.3, 27.1.9, 28.0.5 or 29.0.0.
Authorization
The Nextcloud iOS Files app allows users of iOS to interact with Nextcloud, a self-hosted productivity platform
CVE-2023-49790
4.3 - Medium
- December 22, 2023
The Nextcloud iOS Files app allows users of iOS to interact with Nextcloud, a self-hosted productivity platform. Prior to version 4.9.2, the application can be used without providing the 4 digit PIN code. Nextcloud iOS Files app should be upgraded to 4.9.2 to receive the patch. No known workarounds are available.
authentification
Nextcloud is an open-source productivity platform
CVE-2023-28999
6.4 - Medium
- April 04, 2023
Nextcloud is an open-source productivity platform. In Nextcloud Desktop client 3.0.0 until 3.8.0, Nextcloud Android app 3.13.0 until 3.25.0, and Nextcloud iOS app 3.0.5 until 4.8.0, a malicious server administrator can gain full access to an end-to-end encrypted folder. They can decrypt files, recover the folder structure and add new files.? This issue is fixed in Nextcloud Desktop 3.8.0, Nextcloud Android 3.25.0, and Nextcloud iOS 4.8.0. No known workarounds are available.
Missing Encryption of Sensitive Data
Nextcloud iOS is an ios application used to interface with the nextcloud home cloud ecosystem
CVE-2023-28647
6.8 - Medium
- March 30, 2023
Nextcloud iOS is an ios application used to interface with the nextcloud home cloud ecosystem. In versions prior to 4.7.0 when an attacker has physical access to an unlocked device, they may enable the integration into the iOS Files app and bypass the Nextcloud pin/password protection and gain access to a users files. It is recommended that the Nextcloud iOS app is upgraded to 4.7.0. There are no known workarounds for this vulnerability.
Nextcloud android is an android app for interfacing with the nextcloud home server ecosystem
CVE-2023-28646
2.4 - Low
- March 30, 2023
Nextcloud android is an android app for interfacing with the nextcloud home server ecosystem. In versions from 3.7.0 and before 3.24.1 an attacker that has access to the unlocked physical device can bypass the Nextcloud Android Pin/passcode protection via a thirdparty app. This allows to see meta information like sharer, sharees and activity of files. It is recommended that the Nextcloud Android app is upgraded to 3.24.1. There are no known workarounds for this vulnerability.
Nextcloud android is the official Android client for the Nextcloud home server platform
CVE-2022-39210
5.5 - Medium
- September 17, 2022
Nextcloud android is the official Android client for the Nextcloud home server platform. Internal paths to the Nextcloud Android app files are not properly protected. As a result access to internal files of the from within the Nextcloud Android app is possible. This may lead to a leak of sensitive information in some cases. It is recommended that the Nextcloud Android app is upgraded to 3.21.0. There are no known workarounds for this issue.
Directory traversal
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform
CVE-2022-29243
4.3 - Medium
- May 31, 2022
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Prior to versions 22.2.7 and 23.0.4, missing input-size validation of new session names allows users to create app passwords with long names. These long names are then loaded into memory on usage, resulting in impacted performance. Versions 22.2.7 and 23.0.4 contain a fix for this issue. There are currently no known workarounds available.
Improper Input Validation
Nextcloud Android is the Android client for Nextcloud, a self-hosted productivity platform
CVE-2022-29160
3.3 - Low
- May 20, 2022
Nextcloud Android is the Android client for Nextcloud, a self-hosted productivity platform. Prior to version 3.19.0, sensitive tokens, images, and user related details exist after deletion of a user account. This could result in misuse of the former account holder's information. Nextcloud Android version 3.19.0 contains a patch for this issue. There are no known workarounds available.
Insufficient Cleanup
Nextcloud Android app is the Android client for Nextcloud, a self-hosted productivity platform
CVE-2022-24885
2.4 - Low
- April 27, 2022
Nextcloud Android app is the Android client for Nextcloud, a self-hosted productivity platform. Prior to version 3.19.1, users can bypass a lock on the Nextcloud app on an Android device by repeatedly reopening the app. Version 3.19.1 contains a fix for the problem. There are currently no known workarounds.
authentification
Nextcloud Android app is the Android client for Nextcloud, a self-hosted productivity platform
CVE-2022-24886
3.8 - Low
- April 27, 2022
Nextcloud Android app is the Android client for Nextcloud, a self-hosted productivity platform. In versions prior to 3.19.0, any application with notification permission can access contacts if Nextcloud has access to Contacts without applying for the Contacts permission itself. Version 3.19.0 contains a fix for this issue. There are currently no known workarounds.
Incorrect Permission Assignment for Critical Resource
Nextcloud text is a collaborative document editing using Markdown built for the nextcloud server
CVE-2021-41233
5.3 - Medium
- March 10, 2022
Nextcloud text is a collaborative document editing using Markdown built for the nextcloud server. Due to an issue with the Nextcloud Text application, which is by default shipped with Nextcloud Server, an attacker is able to access the folder names of "File Drop". For successful exploitation an attacker requires knowledge of the sharing link. It is recommended that users upgrade their Nextcloud Server to 20.0.14, 21.0.6 or 22.2.1. Users unable to upgrade should disable the Nextcloud Text application in the application settings.
AuthZ
The Nextcloud Android app is the Android client for Nextcloud, a self-hosted productivity platform
CVE-2021-41166
5.3 - Medium
- January 26, 2022
The Nextcloud Android app is the Android client for Nextcloud, a self-hosted productivity platform. An issue in versions prior to 3.17.1 may lead to sensitive information disclosure. An unauthorized app that does not have the otherwise required `MANAGE_DOCUMENTS` permission may view image thumbnails for images it does not have permission to view. Version 3.17.1 contains a patch. There are no known workarounds.
Incorrect Default Permissions
The Nextcloud Android app is the Android client for Nextcloud, a self-hosted productivity platform
CVE-2021-43863
7.5 - High
- January 25, 2022
The Nextcloud Android app is the Android client for Nextcloud, a self-hosted productivity platform. The Nextcloud Android app uses content providers to manage its data. Prior to version 3.18.1, the providers `FileContentProvider` and `DiskLruImageCacheFileProvider` have security issues (an SQL injection, and an insufficient permission control, respectively) that allow malicious apps in the same device to access Nextcloud's data bypassing the permission control system. Users should upgrade to version 3.18.1 to receive a patch. There are no known workarounds aside from upgrading.
SQL Injection
Nextcloud server is an open source, self hosted personal cloud
CVE-2021-32802
9.8 - Critical
- September 07, 2021
Nextcloud server is an open source, self hosted personal cloud. Nextcloud supports rendering image previews for user provided file content. For some image types, the Nextcloud server was invoking a third-party library that wasn't suited for untrusted user-supplied content. There are several security concerns with passing user-generated content to this library, such as Server-Side-Request-Forgery, file disclosure or potentially executing code on the system. The risk depends on your system configuration and the installed library version. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. These versions do not use this library anymore. As a workaround users may disable previews by setting `enable_previews` to `false` in `config.php`.
Inclusion of Functionality from Untrusted Control Sphere
Nextcloud server is an open source, self hosted personal cloud
CVE-2021-32800
8.1 - High
- September 07, 2021
Nextcloud server is an open source, self hosted personal cloud. In affected versions an attacker is able to bypass Two Factor Authentication in Nextcloud. Thus knowledge of a password, or access to a WebAuthN trusted device of a user was sufficient to gain access to an account. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. There are no workaround for this vulnerability.
Missing Authentication for Critical Function
Nextcloud server is an open source, self hosted personal cloud
CVE-2021-32801
5.5 - Medium
- September 07, 2021
Nextcloud server is an open source, self hosted personal cloud. In affected versions logging of exceptions may have resulted in logging potentially sensitive key material for the Nextcloud Encryption-at-Rest functionality. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. If upgrading is not an option users are advised to disable system logging to resolve this issue until such time that an upgrade can be performed Note that ff you do not use the Encryption-at-Rest functionality of Nextcloud you are not affected by this bug.
Insertion of Sensitive Information into Log File
Nextcloud Text is an open source plaintext editing application which ships with the nextcloud server
CVE-2021-32766
5.3 - Medium
- September 07, 2021
Nextcloud Text is an open source plaintext editing application which ships with the nextcloud server. In affected versions the Nextcloud Text application returned different error messages depending on whether a folder existed in a public link share. This is problematic in case the public link share has been created with "Upload Only" privileges. (aka "File Drop"). A link share recipient is not expected to see which folders or files exist in a "File Drop" share. Using this vulnerability an attacker is able to enumerate folders in such a share. Exploitation requires that the attacker has access to a valid affected "File Drop" link share. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.0.1. Users who are unable to upgrade are advised to disable the Nextcloud Text application in the app settings.
Generation of Error Message Containing Sensitive Information
The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server with a computer
CVE-2021-32728
6.5 - Medium
- August 18, 2021
The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server with a computer. Clients using the Nextcloud end-to-end encryption feature download the public and private key via an API endpoint. In versions prior to 3.3.0, the Nextcloud Desktop client fails to check if a private key belongs to previously downloaded public certificate. If the Nextcloud instance serves a malicious public key, the data would be encrypted for this key and thus could be accessible to a malicious actor. This issue is fixed in Nextcloud Desktop Client version 3.3.0. There are no known workarounds aside from upgrading.
Improper Certificate Validation
Nextcloud Android Client is the Android client for Nextcloud
CVE-2021-32727
7.5 - High
- July 12, 2021
Nextcloud Android Client is the Android client for Nextcloud. Clients using the Nextcloud end-to-end encryption feature download the public and private key via an API endpoint. In versions prior to 3.16.1, the Nextcloud Android client skipped a step that involved the client checking if a private key belonged to a previously downloaded public certificate. If the Nextcloud instance served a malicious public key, the data would be encrypted for this key and thus could be accessible to a malicious actor. The vulnerability is patched in version 3.16.1. As a workaround, do not add additional end-to-end encrypted devices to a user account.
Improper Certificate Validation
Nextcloud Android app is the Android client for Nextcloud
CVE-2021-32694
5.5 - Medium
- June 17, 2021
Nextcloud Android app is the Android client for Nextcloud. In versions prior to 3.15.1, a malicious application on the same device is possible to crash the Nextcloud Android Client due to an uncaught exception. The vulnerability is patched in version 3.15.1.
Uncaught Exception
Nextcloud Android app is the Android client for Nextcloud
CVE-2021-32695
3.3 - Low
- June 17, 2021
Nextcloud Android app is the Android client for Nextcloud. In versions prior to 3.16.1, a malicious app on the same device could have gotten access to the shared preferences of the Nextcloud Android application. This required user-interaction as a victim had to initiate the sharing flow and choose the malicious app. The shared preferences contain some limited private data such as push tokens and the account name. The vulnerability is patched in version 3.16.1.
Nextcloud Mail before 1.9.5 suffers from improper access control due to a missing permission check
CVE-2021-22896
4.3 - Medium
- June 11, 2021
Nextcloud Mail before 1.9.5 suffers from improper access control due to a missing permission check allowing other authenticated users to create mail aliases for other users.
AuthZ
Nextcloud iOS before 3.4.2 suffers
CVE-2021-22912
6.5 - Medium
- June 11, 2021
Nextcloud iOS before 3.4.2 suffers from an information disclosure vulnerability when searches for sharees utilize the lookup server by default instead of only on the local Nextcloud server unless a global search has been explicitly chosen by the user.
Information Disclosure
Nextcloud Android App (com.nextcloud.client) before v3.16.0 is vulnerable to information disclosure due to searches for sharees being performed by default on the lookup server instead of only using the local Nextcloud server unless a global search has been explicitly chosen by the user.
CVE-2021-22905
6.5 - Medium
- June 11, 2021
Nextcloud Android App (com.nextcloud.client) before v3.16.0 is vulnerable to information disclosure due to searches for sharees being performed by default on the lookup server instead of only using the local Nextcloud server unless a global search has been explicitly chosen by the user.
Information Disclosure
Nextcloud Android is the Android client for the Nextcloud open source home cloud system
CVE-2021-32658
4.6 - Medium
- June 08, 2021
Nextcloud Android is the Android client for the Nextcloud open source home cloud system. Due to a timeout issue the Android client may not properly clean all sensitive data on account removal. This could include sensitive key material such as the End-to-End encryption keys. It is recommended that the Nextcloud Android App is upgraded to 3.16.1
Improper Removal of Sensitive Information Before Storage or Transfer
A missing user check in Nextcloud prior to 20.0.6 inadvertently populates a user's own credentials for other users external storage configuration when not already configured yet.
CVE-2021-22877
6.5 - Medium
- March 03, 2021
A missing user check in Nextcloud prior to 20.0.6 inadvertently populates a user's own credentials for other users external storage configuration when not already configured yet.
AuthZ
A missing input validation in Nextcloud Server before 20.0.2, 19.0.5, 18.0.11
CVE-2020-8293
6.5 - Medium
- January 26, 2021
A missing input validation in Nextcloud Server before 20.0.2, 19.0.5, 18.0.11 allows users to store unlimited data in workflow rules causing load and potential DDoS on later interactions and usage with those rules.
Resource Exhaustion
Insufficient protection of the server-side encryption keys in Nextcloud Server 19.0.1
CVE-2020-8152
4.4 - Medium
- November 16, 2020
Insufficient protection of the server-side encryption keys in Nextcloud Server 19.0.1 allowed an attacker to replace the public key to decrypt them later on.
Insufficiently Protected Credentials
Insufficient protection of the server-side encryption keys in Nextcloud Server 19.0.1
CVE-2020-8259
8.1 - High
- November 16, 2020
Insufficient protection of the server-side encryption keys in Nextcloud Server 19.0.1 allowed an attacker to replace the encryption keys.
Insufficiently Protected Credentials
A wrong configuration in Nextcloud Server 19.0.1 incorrectly made the user feel the passwordless WebAuthn is also a two factor verification by asking for the PIN of the passwordless WebAuthn but not verifying it.
CVE-2020-8236
6.8 - Medium
- November 02, 2020
A wrong configuration in Nextcloud Server 19.0.1 incorrectly made the user feel the passwordless WebAuthn is also a two factor verification by asking for the PIN of the passwordless WebAuthn but not verifying it.
authentification
A too small set of random characters being used for encryption in Nextcloud Server 18.0.4
CVE-2020-8173
2.2 - Low
- November 02, 2020
A too small set of random characters being used for encryption in Nextcloud Server 18.0.4 allowed decryption in shorter time than intended.
Missing Encryption of Sensitive Data
A logic error in Nextcloud Server 19.0.0 caused a plaintext storage of the share password when it was given on the initial create API call.
CVE-2020-8183
7.5 - High
- November 02, 2020
A logic error in Nextcloud Server 19.0.0 caused a plaintext storage of the share password when it was given on the initial create API call.
Insufficiently Protected Credentials
A cleartext storage of sensitive information in Nextcloud Desktop Client 2.6.4 gave away information about used proxies and their authentication credentials.
CVE-2020-8225
7.5 - High
- September 18, 2020
A cleartext storage of sensitive information in Nextcloud Desktop Client 2.6.4 gave away information about used proxies and their authentication credentials.
Cleartext Storage of Sensitive Information
Missing sanitization of a server response in Nextcloud Desktop Client 2.6.4 for Linux
CVE-2020-8227
6.8 - Medium
- August 21, 2020
Missing sanitization of a server response in Nextcloud Desktop Client 2.6.4 for Linux allowed a malicious Nextcloud Server to store files outside of the dedicated sync directory.
Directory traversal
A cross-site scripting error in Nextcloud Desktop client 2.6.4
CVE-2020-8189
5.4 - Medium
- August 21, 2020
A cross-site scripting error in Nextcloud Desktop client 2.6.4 allowed to present any html (including local links) when responding with invalid data on the login attempt.
XSS
A memory leak in the OCUtil.dll library used by Nextcloud Desktop Client 2.6.4
CVE-2020-8229
5.5 - Medium
- August 10, 2020
A memory leak in the OCUtil.dll library used by Nextcloud Desktop Client 2.6.4 can lead to a DoS against the host system.
Memory Leak
A code injection in Nextcloud Desktop Client 2.6.4
CVE-2020-8224
7.8 - High
- August 10, 2020
A code injection in Nextcloud Desktop Client 2.6.4 allowed to load arbitrary code when placing a malicious OpenSSL config into a fixed directory.
Code Injection
A code injection in Nextcloud Desktop Client 2.6.2 for macOS
CVE-2020-8140
6.7 - Medium
- March 20, 2020
A code injection in Nextcloud Desktop Client 2.6.2 for macOS allowed to load arbitrary code when starting the client with DYLD_INSERT_LIBRARIES set in the environment.
Code Injection
Not strictly enough sanitization in the Nextcloud Android app 3.6.0
CVE-2019-15622
2.4 - Low
- February 04, 2020
Not strictly enough sanitization in the Nextcloud Android app 3.6.0 allowed an attacker to get content information from protected tables when using custom queries.
SQL Injection
Missing sanitization in the iOS App 2.24.4 causes an XSS when opening malicious HTML files.
CVE-2019-15614
5.4 - Medium
- February 04, 2020
Missing sanitization in the iOS App 2.24.4 causes an XSS when opening malicious HTML files.
XSS
A wrong check for the system time in the Android App 3.9.0 causes a bypass of the lock protection when changing the time of the system to the past.
CVE-2019-15615
6.1 - Medium
- February 04, 2020
A wrong check for the system time in the Android App 3.9.0 causes a bypass of the lock protection when changing the time of the system to the past.
authentification
Violation of Secure Design Principles in the iOS App 2.23.0 causes the app to leak its login and token to other Nextcloud services when search e.g
CVE-2019-15611
4.9 - Medium
- February 04, 2020
Violation of Secure Design Principles in the iOS App 2.23.0 causes the app to leak its login and token to other Nextcloud services when search e.g. for federated users or registering for push notifications.
A reflected Cross-Site Scripting vulnerability in Nextcloud Server 16.0.1 was discovered in the svg generation.
CVE-2020-8120
6.1 - Medium
- February 04, 2020
A reflected Cross-Site Scripting vulnerability in Nextcloud Server 16.0.1 was discovered in the svg generation.
XSS
Bypass lock protection in the Nextcloud Android app prior to version 3.6.2 causes leaking of thumbnails when requesting the Android content provider although the lock protection was not solved.
CVE-2019-5452
2.4 - Low
- July 30, 2019
Bypass lock protection in the Nextcloud Android app prior to version 3.6.2 causes leaking of thumbnails when requesting the Android content provider although the lock protection was not solved.
Bypass lock protection in the Nextcloud Android app prior to version 3.3.0
CVE-2019-5453
6.1 - Medium
- July 30, 2019
Bypass lock protection in the Nextcloud Android app prior to version 3.3.0 allowed access to files when being prompted for the lock protection and switching to the Nextcloud file provider.
authentification
SQL Injection in the Nextcloud Android app prior to version 3.0.0
CVE-2019-5454
9.8 - Critical
- July 30, 2019
SQL Injection in the Nextcloud Android app prior to version 3.0.0 allows to destroy a local cache when a harmful query is executed requiring to resetup the account.
SQL Injection
Bypassing lock protection exists in Nextcloud Android app 3.6.0 when creating a multi-account and aborting the process.
CVE-2019-5455
6.8 - Medium
- July 30, 2019
Bypassing lock protection exists in Nextcloud Android app 3.6.0 when creating a multi-account and aborting the process.
authentification
Improper sanitization of HTML in directory names in the Nextcloud Android app prior to version 3.7.0
CVE-2019-5450
6.8 - Medium
- July 30, 2019
Improper sanitization of HTML in directory names in the Nextcloud Android app prior to version 3.7.0 allowed to style the directory name in the header bar when using basic HTML.
XSS
Nextcloud Server before 9.0.55 and 10.0.2 suffers from a creation of folders in read-only folders despite lacking permissions issue
CVE-2017-0884
4.3 - Medium
- April 05, 2017
Nextcloud Server before 9.0.55 and 10.0.2 suffers from a creation of folders in read-only folders despite lacking permissions issue. Due to a logical error in the file caching layer an authenticated adversary is able to create empty folders inside a shared folder. Note that this only affects folders and files that the adversary has at least read-only permissions for.
Incorrect Permission Assignment for Critical Resource
Nextcloud Server before 9.0.55 and 10.0.2 suffers from a error message disclosing existence of file in write-only share
CVE-2017-0885
4.3 - Medium
- April 05, 2017
Nextcloud Server before 9.0.55 and 10.0.2 suffers from a error message disclosing existence of file in write-only share. Due to an error in the application logic an adversary with access to a write-only share may enumerate the names of existing files and subfolders by comparing the exception messages.
Information Disclosure
Nextcloud Server before 9.0.55 and 10.0.2 suffers from a Denial of Service attack
CVE-2017-0886
6.5 - Medium
- April 05, 2017
Nextcloud Server before 9.0.55 and 10.0.2 suffers from a Denial of Service attack. Due to an error in the application logic an authenticated adversary may trigger an endless recursion in the application leading to a potential Denial of Service.
Stack Exhaustion
Nextcloud Server before 9.0.55 and 10.0.2 suffers from a bypass in the quota limitation
CVE-2017-0887
4.3 - Medium
- April 05, 2017
Nextcloud Server before 9.0.55 and 10.0.2 suffers from a bypass in the quota limitation. Due to not properly sanitizing values provided by the `OC-Total-Length` HTTP header an authenticated adversary may be able to exceed their configured user quota. Thus using more space than allowed by the administrator.
Improper Input Validation
Nextcloud Server before 9.0.55 and 10.0.2 suffers from a Content-Spoofing vulnerability in the "files" app
CVE-2017-0888
4.3 - Medium
- April 05, 2017
Nextcloud Server before 9.0.55 and 10.0.2 suffers from a Content-Spoofing vulnerability in the "files" app. The top navigation bar displayed in the files list contained partially user-controllable input leading to a potential misrepresentation of information.
Improper Input Validation