CVE-2024-52525
low-risk
Published 2024-11-15
Nextcloud Server is a self hosted personal cloud system. Under certain conditions the password of a user was stored unencrypted in the session data. The session data is encrypted before being saved in the session storage (Redis or disk), but it would allow a malicious process that gains access to the memory of the PHP process, to get access to the cleartext password of the user. It is recommended that the Nextcloud Server is upgraded to 28.0.12, 29.0.9 or 30.0.2.
Do I need to act?
-
0.74% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
1
CVSS 1.8/10
Low
PHYSICAL
/ HIGH complexity
Affected Products (2)
Affected Vendors
References (3)
14
/ 100
low-risk
Severity
5/34 · Minimal
Exploitability
2/34 · Minimal
Exposure
7/34 · Low