CVE-2024-52513
low-risk
Published 2024-11-15
Nextcloud Server is a self hosted personal cloud system. After receiving a "Files drop" or "Password protected" share link a malicious user was able to download attachments that are referenced in Text files without providing the password. It is recommended that the Nextcloud Server is upgraded to 28.0.11, 29.0.8 or 30.0.1 and Nextcloud Enterprise Server is upgraded to 25.0.13.13, 26.0.13.9, 27.1.11.9, 28.0.11, 29.0.8 or 30.0.1.
Do I need to act?
-
0.57% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
2
CVSS 2.6/10
Low
NETWORK
/ HIGH complexity
Affected Products (2)
Affected Vendors
References (4)
Issue Tracking
https://github.com/nextcloud/text/pull/6485
Issue Tracking
https://hackerone.com/reports/2376900
19
/ 100
low-risk
Severity
10/34 · Low
Exploitability
2/34 · Minimal
Exposure
7/34 · Low