CVE-2024-22402

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-22402
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-22402.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-22402
Aliases
  • GHSA-v3qw-7vgv-2fxj
Published
2024-01-18T20:23:54.714Z
Modified
2025-12-05T03:11:35.558715Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N CVSS Calculator
Summary
Improper handling of request URLs in Nextcloud Guests app allows guest users to bypass app allowlist
Details

Nextcloud guests app is a utility to create guest users which can only see files shared with them. In affected versions users were able to load the first page of apps they were actually not allowed to access. Depending on the selection of apps installed this may present a permissions bypass. It is recommended that the Guests app is upgraded to 2.4.1, 2.5.1 or 3.0.1. There are no known workarounds for this vulnerability.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/22xxx/CVE-2024-22402.json",
    "cwe_ids": [
        "CWE-281"
    ]
}
References

Affected packages

Git / github.com/nextcloud/guests

Affected ranges

Type
GIT
Repo
https://github.com/nextcloud/guests
Events
Database specific
{
    "versions": [
        {
            "introduced": "2.4.0"
        },
        {
            "fixed": "2.4.1"
        }
    ]
}
Type
GIT
Repo
https://github.com/nextcloud/guests
Events
Database specific
{
    "versions": [
        {
            "introduced": "2.5.0"
        },
        {
            "fixed": "2.5.1"
        }
    ]
}
Type
GIT
Repo
https://github.com/nextcloud/guests
Events
Database specific
{
    "versions": [
        {
            "introduced": "3.0.0"
        },
        {
            "fixed": "3.0.1"
        }
    ]
}

Affected versions

v2.*

v2.4.0
v2.5.0