First published: Wed Mar 22 2023(Updated: )
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform, and Nextcloud Enterprise Server is the enterprise version of the file server software. In Nextcloud Server versions 25.0.x prior to 25.0.5 and versions 24.0.x prior to 24.0.10 as well as Nextcloud Enterprise Server versions 25.0.x prior to 25.0.4, 24.0.x prior to 24.0.10, 23.0.x prior to 23.0.12.5, 22.x prior to 22.2.0.10, and 21.x prior to 21.0.9.10, when an attacker gets access to an already logged in user session they can then brute force the password on the confirmation endpoint. Nextcloud Server should upgraded to 24.0.10 or 25.0.4 and Nextcloud Enterprise Server should upgraded to 21.0.9.10, 22.2.10.10, 23.0.12.5, 24.0.10, or 25.0.4 to receive a patch. No known workarounds are available.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Nextcloud Server | >=21.0.0<21.0.9 | |
Nextcloud Nextcloud Server | >=22.2.0<22.2.10.10 | |
Nextcloud Nextcloud Server | >=23.0.0<23.0.12.5 | |
Nextcloud Nextcloud Server | >=24.0.0<24.0.10 | |
Nextcloud Nextcloud Server | >=24.0.0<24.0.10 | |
Nextcloud Nextcloud Server | >=25.0.0<25.0.4 | |
Nextcloud Nextcloud Server | >=25.0.0<25.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-25820 is a vulnerability in Nextcloud Server that allows remote attackers to execute arbitrary code.
CVE-2023-25820 affects Nextcloud Server versions 25.0.x prior to 25.0.5 and versions 24.0.x prior to 24.0.10.
CVE-2023-25820 has a severity rating of 7.8 (High).
To fix CVE-2023-25820, you should update Nextcloud Server to version 24.0.10 or higher for 24.x versions, and version 25.0.5 or higher for 25.x versions.
You can find more information about CVE-2023-25820 in the following references: [GitHub Advisory](https://github.com/nextcloud/security-advisories/security/advisories/GHSA-36g6-wjx2-333x), [GitHub Pull Request](https://github.com/nextcloud/server/pull/36489), [HackerOne Report](https://hackerone.com/reports/1842114).