7.8

CVE-2023-25820

Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform, and Nextcloud Enterprise Server is the enterprise version of the file server software. In Nextcloud Server versions 25.0.x prior to 25.0.5 and versions 24.0.x prior to 24.0.10 as well as Nextcloud Enterprise Server versions 25.0.x prior to 25.0.4, 24.0.x prior to 24.0.10, 23.0.x prior to 23.0.12.5, 22.x prior to 22.2.0.10, and 21.x prior to 21.0.9.10, when an attacker gets access to an already logged in user session they can then brute force the password on the confirmation endpoint. Nextcloud Server should upgraded to 24.0.10 or 25.0.4 and Nextcloud Enterprise Server should upgraded to 21.0.9.10, 22.2.10.10, 23.0.12.5, 24.0.10, or 25.0.4 to receive a patch. No known workarounds are available.

Data is provided by the National Vulnerability Database (NVD)
NextcloudNextcloud Server SwEditionenterprise Version >= 21.0.0 < 21.0.9
NextcloudNextcloud Server SwEditionenterprise Version >= 22.2.0 < 22.2.10.10
NextcloudNextcloud Server SwEditionenterprise Version >= 23.0.0 < 23.0.12.5
NextcloudNextcloud Server Version >= 24.0.0 < 24.0.10
NextcloudNextcloud Server SwEditionenterprise Version >= 24.0.0 < 24.0.10
NextcloudNextcloud Server Version >= 25.0.0 < 25.0.4
NextcloudNextcloud Server SwEditionenterprise Version >= 25.0.0 < 25.0.4
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.13% 0.333
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
security-advisories@github.com 4.2 0.8 3.4
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L
CWE-307 Improper Restriction of Excessive Authentication Attempts

The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame.