Nextcloud Server is a self hosted personal cloud system. After receiving a "Files drop" or "Password protected" share link a malicious user was able to download attachments that are referenced in Text files without providing the password. It is recommended that the Nextcloud Server is upgraded to 28.0.11, 29.0.8 or 30.0.1 and Nextcloud Enterprise Server is upgraded to 25.0.13.13, 26.0.13.9, 27.1.11.9, 28.0.11, 29.0.8 or 30.0.1.
References
Link | Resource |
---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gxph-5m4j-pfmj | Vendor Advisory |
https://github.com/nextcloud/text/commit/ca24b25c93b81626b4e457c260243edeab5f1548 | Patch |
https://github.com/nextcloud/text/pull/6485 | Issue Tracking |
https://hackerone.com/reports/2376900 | Issue Tracking |
Configurations
Configuration 1 (hide)
|
History
01 Oct 2025, 18:04
Type | Values Removed | Values Added |
---|---|---|
First Time |
Nextcloud nextcloud Server
Nextcloud |
|
CWE | NVD-CWE-noinfo | |
References | () https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gxph-5m4j-pfmj - Vendor Advisory | |
References | () https://github.com/nextcloud/text/commit/ca24b25c93b81626b4e457c260243edeab5f1548 - Patch | |
References | () https://github.com/nextcloud/text/pull/6485 - Issue Tracking | |
References | () https://hackerone.com/reports/2376900 - Issue Tracking | |
CPE | cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:* cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:* |
18 Nov 2024, 17:11
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
15 Nov 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-15 18:15
Updated : 2025-10-01 18:04
NVD link : CVE-2024-52513
Mitre link : CVE-2024-52513
CVE.ORG link : CVE-2024-52513
JSON object : View
Products Affected
nextcloud
- nextcloud_server
CWE