{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-30T20:47:20.583","vulnerabilities":[{"cve":{"id":"CVE-2023-25816","sourceIdentifier":"security-advisories@github.com","published":"2023-02-25T00:15:11.003","lastModified":"2024-11-21T07:50:15.473","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Nextcloud is an Open Source private cloud software. Versions 25.0.0 and above, prior to 25.0.3, are subject to Uncontrolled Resource Consumption. A user can configure a very long password, consuming more resources on password validation than desired. This issue is patched in 25.0.3 No workaround is available.\n"},{"lang":"es","value":"Nextcloud es un software de nube privada de código abierto. Las versiones 25.0.0 y superiores, anteriores a la 25.0.3, están sujetas al Consumo Incontrolado de Recursos. Un usuario puede configurar una contraseña muy larga, consumiendo más recursos de los deseados en la validación de contraseña. Este problema se solucionó en 25.0.3. No hay ningún workaround disponible."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-400"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-400"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*","versionStartIncluding":"25.0.0","versionEndExcluding":"25.0.3","matchCriteriaId":"6C9E81EC-178A-4A85-A912-F8765456F60D"},{"vulnerable":true,"criteria":"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"25.0.0","versionEndExcluding":"25.0.3","matchCriteriaId":"C5E90102-61F6-4A2A-8EEC-A2795DCB56FF"}]}]}],"references":[{"url":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-53q2-cm29-7j83","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://github.com/nextcloud/server/pull/35965","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://hackerone.com/reports/1820864","source":"security-advisories@github.com","tags":["Exploit","Mitigation","Third Party Advisory"]},{"url":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-53q2-cm29-7j83","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://github.com/nextcloud/server/pull/35965","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://hackerone.com/reports/1820864","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Mitigation","Third Party Advisory"]}]}}]}