{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T01:58:40.359","vulnerabilities":[{"cve":{"id":"CVE-2025-47793","sourceIdentifier":"security-advisories@github.com","published":"2025-05-16T15:15:48.070","lastModified":"2025-09-08T21:54:14.767","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Nextcloud Server is a self hosted personal cloud system, and the Nextcloud Groupfolders app provides admin-configured folders shared by everyone in a group or team. In Nextcloud Server prior to 30.0.2, 29.0.9, and 28.0.1, Nextcloud Enterprise Server prior to 30.0.2 and 29.0.9, and Nextcloud Groupfolders app prior to 18.0.3, 17.0.5, and 16.0.11, the absence of quota checking on attachments allowed logged-in users to upload files exceeding the group folder quota. Nextcloud Server versions 30.0.2 and 29.0.9, Nextcloud Enterprise Server versions 30.0.2, 29.0.9, or 28.0.12, and Nextcloud Groupfolders app 18.0.3, 17.0.5, and 16.0.11 fix the issue. No known workarounds are available."},{"lang":"es","value":"Nextcloud Server es un sistema de nube personal autoalojado, y la aplicación Nextcloud Groupfolders proporciona carpetas configuradas por el administrador y compartidas por todos los miembros de un grupo o equipo. En Nextcloud Server anteriores a las versiones 30.0.2, 29.0.9 y 28.0.1, Nextcloud Enterprise Server anteriores a las versiones 30.0.2 y 29.0.9, y la aplicación Nextcloud Groupfolders anteriores a las versiones 18.0.3, 17.0.5 y 16.0.11, la ausencia de comprobación de cuota para los adjuntos permitía a los usuarios conectados subir archivos que excedían la cuota de la carpeta de grupo. Las versiones 30.0.2 y 29.0.9 de Nextcloud Server, Nextcloud Enterprise Server 30.0.2, 29.0.9 o 28.0.12, y la aplicación Nextcloud Groupfolders 18.0.3, 17.0.5 y 16.0.11 solucionan el problema. No se conocen workarounds."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-770"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:nextcloud:group_folders:*:*:*:*:*:*:*:*","versionStartIncluding":"16.0.0","versionEndExcluding":"16.0.11","matchCriteriaId":"39AD1E50-2B47-4839-8CB6-AA0978B85A82"},{"vulnerable":true,"criteria":"cpe:2.3:a:nextcloud:group_folders:*:*:*:*:*:*:*:*","versionStartIncluding":"17.0.0","versionEndExcluding":"17.0.5","matchCriteriaId":"EFBB99C6-11F6-4515-AAF3-42F014902176"},{"vulnerable":true,"criteria":"cpe:2.3:a:nextcloud:group_folders:*:*:*:*:*:*:*:*","versionStartIncluding":"18.0.0","versionEndExcluding":"18.0.3","matchCriteriaId":"6A7E3F43-20A2-49E4-BF82-FDA239B93169"},{"vulnerable":true,"criteria":"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"28.0.0","versionEndExcluding":"28.0.12","matchCriteriaId":"0D64CB01-AF54-472F-A70B-0910DB01B7EF"},{"vulnerable":true,"criteria":"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*","versionStartIncluding":"29.0.0","versionEndExcluding":"29.0.9","matchCriteriaId":"71EE8159-DEB8-452B-A7E5-4D8CED48545B"},{"vulnerable":true,"criteria":"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"29.0.0","versionEndExcluding":"29.0.9","matchCriteriaId":"5B11C227-AAC6-4053-BDC0-2E732B95A854"},{"vulnerable":true,"criteria":"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*","versionStartIncluding":"30.0.0","versionEndExcluding":"30.0.2","matchCriteriaId":"A0880BD6-1031-428B-85D3-83BCC13FF10F"},{"vulnerable":true,"criteria":"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"30.0.0","versionEndExcluding":"30.0.2","matchCriteriaId":"5BBD7BC5-F07B-4CB8-8FC7-74BDE3BBEDC5"}]}]}],"references":[{"url":"https://github.com/nextcloud/groupfolders/pull/3328","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-qqgg-hhfq-vhww","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/nextcloud/server/pull/48623","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://hackerone.com/reports/2713272","source":"security-advisories@github.com","tags":["Permissions Required"]}]}}]}