{"api_version":"1","generated_at":"2026-04-24T05:32:11+00:00","cve":"CVE-2022-39211","urls":{"html":"https://cve.report/CVE-2022-39211","api":"https://cve.report/api/cve/CVE-2022-39211.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-39211","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-39211"},"summary":{"title":"CVE-2022-39211","description":"Nextcloud server is an open source personal cloud platform. In affected versions it was found that locally running webservices can be found and requested erroneously. It is recommended that the Nextcloud Server is upgraded to 23.0.8 or 24.0.4. It is recommended that the Nextcloud Enterprise Server is upgraded to 22.2.10.4, 23.0.8 or 24.0.4. There are no known workarounds for this issue.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2022-09-16 23:15:00","updated_at":"2022-09-21 14:53:00"},"problem_types":["CWE-918"],"metrics":[],"references":[{"url":"https://github.com/nextcloud/server/pull/33031","name":"https://github.com/nextcloud/server/pull/33031","refsource":"MISC","tags":[],"title":"Improve local IP detection by come-nc · Pull Request #33031 · nextcloud/server · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-rmf9-w497-8cq8","name":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-rmf9-w497-8cq8","refsource":"CONFIRM","tags":[],"title":"Server-Side Request Forgery (SSRF) via potential filter bypass with too lax local domain checking · Advisory · nextcloud/security-advisories · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/nextcloud/server/pull/32988","name":"https://github.com/nextcloud/server/pull/32988","refsource":"MISC","tags":[],"title":"Improve local domain detection by come-nc · Pull Request #32988 · nextcloud/server · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-39211","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-39211","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"39211","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"nextcloud","cpe5":"nextcloud_enterprise_server","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"39211","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"nextcloud","cpe5":"nextcloud_server","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2022-39211","STATE":"PUBLIC","TITLE":"Server-Side Request Forgery (SSRF) via potential filter bypass in Nextcloud Server"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"security-advisories","version":{"version_data":[{"version_value":"< 23.0.8"},{"version_value":">= 24.0.0, < 24.0.4"}]}}]},"vendor_name":"nextcloud"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Nextcloud server is an open source personal cloud platform. In affected versions it was found that locally running webservices can be found and requested erroneously. It is recommended that the Nextcloud Server is upgraded to 23.0.8 or 24.0.4. It is recommended that the Nextcloud Enterprise Server is upgraded to 22.2.10.4, 23.0.8 or 24.0.4. There are no known workarounds for this issue."}]},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":3,"baseSeverity":"LOW","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:N/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-918: Server-Side Request Forgery (SSRF)"}]}]},"references":{"reference_data":[{"name":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-rmf9-w497-8cq8","refsource":"CONFIRM","url":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-rmf9-w497-8cq8"},{"name":"https://github.com/nextcloud/server/pull/32988","refsource":"MISC","url":"https://github.com/nextcloud/server/pull/32988"},{"name":"https://github.com/nextcloud/server/pull/33031","refsource":"MISC","url":"https://github.com/nextcloud/server/pull/33031"}]},"source":{"advisory":"GHSA-rmf9-w497-8cq8","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2022-09-16 23:15:00","lastModifiedDate":"2022-09-21 14:53:00","problem_types":["CWE-918"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":3.9,"impactScore":1.4}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*","versionStartIncluding":"24.0.0","versionEndExcluding":"24.0.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*","versionEndExcluding":"23.0.8","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nextcloud:nextcloud_enterprise_server:*:*:*:*:*:*:*:*","versionEndExcluding":"22.2.10.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nextcloud:nextcloud_enterprise_server:*:*:*:*:*:*:*:*","versionStartIncluding":"23.0.0","versionEndExcluding":"23.0.8","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nextcloud:nextcloud_enterprise_server:*:*:*:*:*:*:*:*","versionStartIncluding":"24.0.0","versionEndExcluding":"24.0.4","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}