{"api_version":"1","generated_at":"2026-04-23T04:21:41+00:00","cve":"CVE-2021-39225","urls":{"html":"https://cve.report/CVE-2021-39225","api":"https://cve.report/api/cve/CVE-2021-39225.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-39225","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-39225"},"summary":{"title":"CVE-2021-39225","description":"Nextcloud is an open-source, self-hosted productivity platform. A missing permission check in Nextcloud Deck before 1.2.9, 1.4.5 and 1.5.3 allows another authenticated users to access Deck cards of another user. It is recommended that the Nextcloud Deck App is upgraded to 1.2.9, 1.4.5 or 1.5.3. There are no known workarounds aside from upgrading.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2021-10-25 22:15:00","updated_at":"2022-04-25 18:02:00"},"problem_types":["CWE-862"],"metrics":[],"references":[{"url":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2x96-38qg-3m72","name":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2x96-38qg-3m72","refsource":"CONFIRM","tags":[],"title":"Missing permission check on Deck API · Advisory · nextcloud/security-advisories · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/nextcloud/deck/pull/3316","name":"https://github.com/nextcloud/deck/pull/3316","refsource":"MISC","tags":[],"title":"Additional check for stacks by juliushaertl · Pull Request #3316 · nextcloud/deck · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://hackerone.com/reports/1331728","name":"https://hackerone.com/reports/1331728","refsource":"MISC","tags":[],"title":"HackerOne","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-39225","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-39225","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"39225","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"nextcloud","cpe5":"deck","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2021-39225","STATE":"PUBLIC","TITLE":"Missing permission check on Deck API"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"security-advisories","version":{"version_data":[{"version_value":"< 1.2.9"},{"version_value":">= 1.4.0, < 1.4.5"},{"version_value":">= 1.5.0, < 1.5.3"}]}}]},"vendor_name":"nextcloud"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Nextcloud is an open-source, self-hosted productivity platform. A missing permission check in Nextcloud Deck before 1.2.9, 1.4.5 and 1.5.3 allows another authenticated users to access Deck cards of another user. It is recommended that the Nextcloud Deck App is upgraded to 1.2.9, 1.4.5 or 1.5.3. There are no known workarounds aside from upgrading."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.1,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-639: Authorization Bypass Through User-Controlled Key"}]}]},"references":{"reference_data":[{"name":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2x96-38qg-3m72","refsource":"CONFIRM","url":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2x96-38qg-3m72"},{"name":"https://github.com/nextcloud/deck/pull/3316","refsource":"MISC","url":"https://github.com/nextcloud/deck/pull/3316"},{"name":"https://hackerone.com/reports/1331728","refsource":"MISC","url":"https://hackerone.com/reports/1331728"}]},"source":{"advisory":"GHSA-2x96-38qg-3m72","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2021-10-25 22:15:00","lastModifiedDate":"2022-04-25 18:02:00","problem_types":["CWE-862"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":8.1,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.2},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":5.5},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nextcloud:deck:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2.9","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nextcloud:deck:*:*:*:*:*:*:*:*","versionStartIncluding":"1.5.0","versionEndExcluding":"1.5.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nextcloud:deck:*:*:*:*:*:*:*:*","versionStartIncluding":"1.3.0","versionEndExcluding":"1.4.5","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"39225","Ordinal":"214908","Title":"CVE-2021-39225","CVE":"CVE-2021-39225","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"39225","Ordinal":"1","NoteData":"Nextcloud is an open-source, self-hosted productivity platform. A missing permission check in Nextcloud Deck before 1.2.9, 1.4.5 and 1.5.3 allows another authenticated users to access Deck cards of another user. It is recommended that the Nextcloud Deck App is upgraded to 1.2.9, 1.4.5 or 1.5.3. There are no known workarounds aside from upgrading.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"39225","Ordinal":"2","NoteData":"2021-10-25","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"39225","Ordinal":"3","NoteData":"2021-10-25","Type":"Other","Title":"Modified"}]}}}