{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T14:34:22.921","vulnerabilities":[{"cve":{"id":"CVE-2024-22402","sourceIdentifier":"security-advisories@github.com","published":"2024-01-18T21:15:08.590","lastModified":"2024-11-21T08:56:12.680","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Nextcloud guests app is a utility to create guest users which can only see files shared with them. In affected versions users were able to load the first page of apps they were actually not allowed to access. Depending on the selection of apps installed this may present a permissions bypass. It is recommended that the Guests app is upgraded to 2.4.1, 2.5.1 or 3.0.1. There are no known workarounds for this vulnerability."},{"lang":"es","value":"La aplicación para invitados Nextcloud es una utilidad para crear usuarios invitados que solo pueden ver los archivos compartidos con ellos. En las versiones afectadas, los usuarios podían cargar la primera página de aplicaciones a las que en realidad no se les permitía acceder. Sin embargo, todas las llamadas API posteriores fallaron correctamente, por lo que en la mayoría de las aplicaciones no se filtró información adicional. Dependiendo de la selección de aplicaciones instaladas, esto puede presentar una omisión de permisos. Se recomienda actualizar la aplicación Invitados a 2.4.1, 2.5.1 o 3.0.1. No se conocen workarounds para esta vulnerabilidad."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.5},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.5}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-281"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:nextcloud:guests:*:*:*:*:*:*:*:*","versionEndExcluding":"2.4.1","matchCriteriaId":"96F65F1E-19D7-4B72-8618-A7D8BE0578E4"},{"vulnerable":true,"criteria":"cpe:2.3:a:nextcloud:guests:2.5.0:*:*:*:*:*:*:*","matchCriteriaId":"57F1277A-3A44-4CDF-AF3C-B8A5AE395549"},{"vulnerable":true,"criteria":"cpe:2.3:a:nextcloud:guests:3.0.0:*:*:*:*:*:*:*","matchCriteriaId":"F64336EF-9FEA-4DC2-B44A-70470D52632B"}]}]}],"references":[{"url":"https://github.com/nextcloud/guests/pull/1082","source":"security-advisories@github.com","tags":["Patch","Vendor Advisory"]},{"url":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-v3qw-7vgv-2fxj","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://hackerone.com/reports/2251074","source":"security-advisories@github.com","tags":["Permissions Required","Third Party Advisory"]},{"url":"https://github.com/nextcloud/guests/pull/1082","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-v3qw-7vgv-2fxj","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://hackerone.com/reports/2251074","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Permissions Required","Third Party Advisory"]}]}}]}