5.3
CVE-2025-47791
- EPSS 0.16%
- Veröffentlicht 16.05.2025 14:09:27
- Zuletzt bearbeitet 19.09.2025 17:41:47
- Quelle security-advisories@github.com
- CVE-Watchlists
- Unerledigt
Nextcloud Server's test remote endpoint is not rate limited
Test remote endpoint is not rate limited
Nextcloud Server is a self hosted personal cloud system. In Nextcloud Server prior to 28.0.13, 29.0.10, and 30.0.3 and Nextcloud Enterprise Server prior to 28.0.13, 29.0.10, and 30.0.3, a currently unused endpoint to verify a share recipient was not protected correctly, allowing to proxy requests to another server. The endpoint was removed in Nextcloud Server 28.0.13, 29.0.10, and 30.0.3 and Nextcloud Enterprise Server 28.0.13, 29.0.10, and 30.0.3. No known workarounds are available.
Mögliche Gegenmaßnahme
Server: * No workaround available
Enterprise Server: * No workaround available
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Nextcloud ≫ Nextcloud Server SwEdition- Version >= 28.0.0 < 28.0.13
Nextcloud ≫ Nextcloud Server SwEditionenterprise Version >= 28.0.0 < 28.0.13
Nextcloud ≫ Nextcloud Server SwEdition- Version >= 29.0.0 < 29.0.10
Nextcloud ≫ Nextcloud Server SwEditionenterprise Version >= 29.0.0 < 29.0.10
Nextcloud ≫ Nextcloud Server SwEdition- Version >= 30.0.0 < 30.0.3
Nextcloud ≫ Nextcloud Server SwEditionenterprise Version >= 30.0.0 < 30.0.3
VulnDex Vulnerability Enrichment
Weitere Schwachstelleninformationen
SystemNextcloud
≫
Produkt
Server
Version
>= 0.0.0, < 28.0.0
Version
>= 29.0.0, < 29.0.0
Version
>= 30.0.0, < 30.0.0
SystemNextcloud
≫
Produkt
Enterprise Server
Version
>= 0.0.0, < 28.0.0
Version
>= 29.0.0, < 29.0.0
Version
>= 30.0.0, < 30.0.0
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.16% | 0.36 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
|
| security-advisories@github.com | 4.3 | 2.8 | 1.4 |
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
|
CWE-918 Server-Side Request Forgery (SSRF)
The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.