Versions
19.0.2
15.0.6
15.0.1
14.0.4
16.0.2
Fixed in 17.0.2, 16.0.7, and 15.0.14
<14.0.0, <13.0.6, <12.0.11
16.0.1
Fixed in 19.0.11, 20.0.10, 21.0.2
<14.0.0, <13.0.3, <12.0.8
Fixed in 19.0.1
15.0.7
Fixed in 18.0.1, 17.0.4, and 16.0.9
17.0.2
18.0.3
Fixed in 20.0.6
19.0.1
Fixed in 20.0.0
17.0.0
Fixed in 20.0.2, 19.0.5, 18.0.11
17.0.1
15.0.3
<14.0.0
18.0.4
16.0.4
Recent CVEs
CVE-2021-22915
Nextcloud server before 19.0.11, 20.0.10, 21.0.2 is vulnerable to brute force attacks due to lack of inclusion of IPv6 subnets in rate-limiting considerations. This could potentially result in an attacker bypassing rate-limit controls such as the Nextcloud brute-force protection.
CVE-2020-8296
Nextcloud Server prior to 20.0.0 stores passwords in a recoverable format even when external storage is not configured.
CVE-2021-22878
Nextcloud Server prior to 20.0.6 is vulnerable to reflected cross-site scripting (XSS) due to lack of sanitization in `OC.Notification.show`.
CVE-2021-22877
A missing user check in Nextcloud prior to 20.0.6 inadvertently populates a user's own credentials for other users external storage configuration when not already configured yet.
CVE-2020-8295
A wrong check in Nextcloud Server 19 and prior allowed to perform a denial of service attack when resetting the password for a user.
CVE-2020-8293
A missing input validation in Nextcloud Server before 20.0.2, 19.0.5, 18.0.11 allows users to store unlimited data in workflow rules causing load and potential DDoS on later interactions and usage with those rules.
CVE-2020-8259
Insufficient protection of the server-side encryption keys in Nextcloud Server 19.0.1 allowed an attacker to replace the encryption keys.
CVE-2020-8152
Insufficient protection of the server-side encryption keys in Nextcloud Server 19.0.1 allowed an attacker to replace the public key to decrypt them later on.