{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T13:15:50.198","vulnerabilities":[{"cve":{"id":"CVE-2025-47794","sourceIdentifier":"security-advisories@github.com","published":"2025-05-16T15:15:48.213","lastModified":"2025-09-30T19:37:40.473","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Nextcloud Server is a self hosted personal cloud system. In Nextcloud Server prior to 29.0.13, 30.0.7, and 31.0.1 and Nextcloud Enterprise Server prior to 26.0.13.13, 27.1.11.13, 28.0.14.4, 29.0.13, 30.0.7, and 31.0.1, an attacker on a multi-user system may read temporary files from Nextcloud running with a different user account, or run a symlink attack. Nextcloud Server versions 29.0.13, 30.0.7, and 31.0.1 and Nextcloud Enterprise Server 26.0.13.13, 27.1.11.13, 28.0.14.4, 29.0.13, 30.0.7, and 31.0.1 fix the issue. No known workarounds are available."},{"lang":"es","value":"Nextcloud Server es un sistema de nube personal autoalojado. En Nextcloud Server anteriores a las versiones 29.0.13, 30.0.7 y 31.0.1, y en Nextcloud Enterprise Server anteriores a las versiones 26.0.13.13, 27.1.11.13, 28.0.14.4, 29.0.13, 30.0.7 y 31.0.1, un atacante en un sistema multiusuario podría leer archivos temporales de Nextcloud con una cuenta de usuario diferente o ejecutar un ataque de enlace simbólico. Las versiones 29.0.13, 30.0.7 y 31.0.1 de Nextcloud Server y las versiones 26.0.13.13, 27.1.11.13, 28.0.14.4, 29.0.13, 30.0.7 y 31.0.1 de Nextcloud Server solucionan el problema. No se conocen workarounds disponibles."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N","baseScore":2.6,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.2,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-284"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"26.0.0","versionEndExcluding":"26.0.13.13","matchCriteriaId":"A19CDEA0-5A9C-4FC7-96EA-86C5B92FC878"},{"vulnerable":true,"criteria":"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"27.0.0","versionEndExcluding":"27.1.11.13","matchCriteriaId":"007088B7-28CC-485B-AA3B-BB1557AA4C46"},{"vulnerable":true,"criteria":"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"28.0.0","versionEndExcluding":"28.0.14.4","matchCriteriaId":"28B82423-C680-4F16-8115-035209CD8B49"},{"vulnerable":true,"criteria":"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*","versionStartIncluding":"29.0.0","versionEndExcluding":"29.0.13","matchCriteriaId":"1690D3BB-8E12-4E59-BC20-C0324D5A0512"},{"vulnerable":true,"criteria":"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"29.0.0","versionEndExcluding":"29.0.13","matchCriteriaId":"F37D15F4-E32F-4E51-8AB7-89C2D78CFB4A"},{"vulnerable":true,"criteria":"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*","versionStartIncluding":"30.0.0","versionEndExcluding":"30.0.7","matchCriteriaId":"81570AC8-0168-4AB6-BE17-1830CC019A6B"},{"vulnerable":true,"criteria":"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"30.0.0","versionEndExcluding":"30.0.7","matchCriteriaId":"310DE665-C910-4899-84F6-566E52EC4515"},{"vulnerable":true,"criteria":"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*","versionStartIncluding":"31.0.0","versionEndExcluding":"31.0.1","matchCriteriaId":"D8631F6B-EED4-4B47-84C3-7BC63464AC15"},{"vulnerable":true,"criteria":"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"31.0.0","versionEndExcluding":"31.0.1","matchCriteriaId":"52B7D78F-BCCC-4178-BB21-AB9587D11386"}]}]}],"references":[{"url":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-q568-2933-gcjq","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://github.com/nextcloud/server/pull/51194","source":"security-advisories@github.com","tags":["Issue Tracking"]},{"url":"https://hackerone.com/reports/1960647","source":"security-advisories@github.com","tags":["Permissions Required"]}]}}]}