First published: Thu Mar 30 2023(Updated: )
Nextcloud server is an open source home cloud implementation. In affected versions a missing scope validation allowed users to create workflows which are designed to be only available for administrators. Some workflows are designed to be RCE by invoking defined scripts, in order to generate PDFs, invoking webhooks or running scripts on the server. Due to this combination depending on the available apps the issue can result in a RCE at the end. It is recommended that the Nextcloud Server is upgraded to 24.0.10 or 25.0.4. Users unable to upgrade should disable app `workflow_scripts` and `workflow_pdf_converter` as a mitigation.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Nextcloud Server | >=18.0.0<20.0.14.12 | |
Nextcloud Nextcloud Server | >=21.0.0<21.0.9.10 | |
Nextcloud Nextcloud Server | >=22.0.0<22.2.10.10 | |
Nextcloud Nextcloud Server | >=23.0.0<23.0.12.5 | |
Nextcloud Nextcloud Server | >=24.0.0<24.0.10 | |
Nextcloud Nextcloud Server | >=24.0.0<24.0.10 | |
Nextcloud Nextcloud Server | >=25.0.0<25.0.4 | |
Nextcloud Nextcloud Server | >=25.0.0<25.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-26482 is a vulnerability in Nextcloud server that allows users to create workflows with RCE capabilities.
Nextcloud server versions 18.0.0 to 25.0.4 are affected by CVE-2023-26482.
CVE-2023-26482 has a severity rating of 8.8 (Critical).
To fix CVE-2023-26482, users are advised to update their Nextcloud server to the latest version available.
More information about CVE-2023-26482 can be found in the Nextcloud security advisories and the Nextcloud server commit on GitHub.