{"api_version":"1","generated_at":"2026-04-07T22:33:25+00:00","cve":"CVE-2023-45151","urls":{"html":"https://cve.report/CVE-2023-45151","api":"https://cve.report/api/cve/CVE-2023-45151.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-45151","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-45151"},"summary":{"title":"CVE-2023-45151","description":"Nextcloud server is an open source home cloud platform. Affected versions of Nextcloud stored OAuth2 tokens in plaintext which allows an attacker who has gained access to the server to potentially elevate their privilege. This issue has been addressed and users are recommended to upgrade their Nextcloud Server to version 25.0.8, 26.0.3 or 27.0.1. There are no known workarounds for this vulnerability.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2023-10-16 19:15:00","updated_at":"2023-10-20 12:18:00"},"problem_types":["CWE-312"],"metrics":[],"references":[{"url":"https://github.com/nextcloud/server/pull/38398","name":"https://github.com/nextcloud/server/pull/38398","refsource":"MISC","tags":[],"title":"Store encrypted OAuth2 client secrets by julien-nc · Pull Request #38398 · nextcloud/server · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://hackerone.com/reports/1994324","name":"https://hackerone.com/reports/1994324","refsource":"MISC","tags":[],"title":"HackerOne","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-hhgv-jcg9-p4m9","name":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-hhgv-jcg9-p4m9","refsource":"MISC","tags":[],"title":"OAuth2 client_secret stored in plain text in the database · Advisory · nextcloud/security-advisories · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-45151","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-45151","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"45151","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"nextcloud","cpe5":"nextcloud_server","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"-","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"45151","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"nextcloud","cpe5":"nextcloud_server","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"enterprise","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"45151","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"nextcloud","cpe5":"nextcloud_server","cpe6":"27.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"-","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"45151","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"nextcloud","cpe5":"nextcloud_server","cpe6":"27.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"enterprise","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-45151","ASSIGNER":"security-advisories@github.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Nextcloud server is an open source home cloud platform. Affected versions of Nextcloud stored OAuth2 tokens in plaintext which allows an attacker who has gained access to the server to potentially elevate their privilege. This issue has been addressed and users are recommended to upgrade their Nextcloud Server to version 25.0.8, 26.0.3 or 27.0.1. There are no known workarounds for this vulnerability."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-312: Cleartext Storage of Sensitive Information","cweId":"CWE-312"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"nextcloud","product":{"product_data":[{"product_name":"security-advisories","version":{"version_data":[{"version_affected":"=","version_value":">= 25.0.0, < 25.0.8"},{"version_affected":"=","version_value":">= 26.0.0, < 26.0.3"},{"version_affected":"=","version_value":">= 27.0.0, < 27.0.1"}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-hhgv-jcg9-p4m9","refsource":"MISC","name":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-hhgv-jcg9-p4m9"},{"url":"https://github.com/nextcloud/server/pull/38398","refsource":"MISC","name":"https://github.com/nextcloud/server/pull/38398"},{"url":"https://hackerone.com/reports/1994324","refsource":"MISC","name":"https://hackerone.com/reports/1994324"}]},"source":{"advisory":"GHSA-hhgv-jcg9-p4m9","discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N","version":"3.1"}]}},"nvd":{"publishedDate":"2023-10-16 19:15:00","lastModifiedDate":"2023-10-20 12:18:00","problem_types":["CWE-312"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nextcloud:nextcloud_server:27.0.0:*:*:*:-:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nextcloud:nextcloud_server:27.0.0:*:*:*:enterprise:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*","versionStartIncluding":"26.0.0","versionEndExcluding":"26.0.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"26.0.0","versionEndExcluding":"26.0.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*","versionStartIncluding":"25.0.0","versionEndExcluding":"25.0.8","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"25.0.0","versionEndExcluding":"25.0.8","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}