CVE-2023-48307

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-48307
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-48307.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-48307
Aliases
  • GHSA-4pp4-m8ph-2999
Published
2023-11-21T22:22:56Z
Modified
2025-10-21T19:33:20Z
Severity
  • 3.5 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L CVSS Calculator
Summary
Nextcloud Mail app vulnerable to Server-Side Request Forgery
Details

Nextcloud Mail is the mail app for Nextcloud, a self-hosted productivity platform. Starting in version 1.13.0 and prior to version 2.2.8 and 3.3.0, an attacker can use an unprotected endpoint in the Mail app to perform a SSRF attack. Nextcloud Mail app versions 2.2.8 and 3.3.0 contain a patch for this issue. As a workaround, disable the mail app.

Database specific
{
    "cwe_ids": [
        "CWE-918"
    ]
}
References

Affected packages

Git / github.com/nextcloud/mail

Affected ranges

Type
GIT
Repo
https://github.com/nextcloud/mail
Events