In Nextcloud Contacts before 2.1.2, a missing sanitization of search results for an autocomplete field could lead to a stored XSS requiring user-interaction. The missing sanitization only affected group names, hence malicious search results could only be crafted by privileged users like admins or g...
4.8CVSS
4.7AI Score
0.001EPSS
A missing file type check in Nextcloud Contacts 3.2.0 allowed a malicious user to upload any file as avatars.
4.3CVSS
4.4AI Score
0.001EPSS
A missing file type check in Nextcloud Contacts 3.4.0 allows a malicious user to upload SVG files as PNG files to perform cross-site scripting (XSS) attacks.
5.4CVSS
5.2AI Score
0.001EPSS
A missing file type check in Nextcloud Contacts 3.3.0 allows a malicious user to upload malicious SVG files to perform cross-site scripting (XSS) attacks.
5.4CVSS
5.2AI Score
0.001EPSS
Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud Contacts application prior to version 4.0.3 was vulnerable to a stored Cross-Site Scripting (XSS) vulnerability. For exploitation, a user would need to right-click on a malicious file and open the file in a new tab. Due t...
6.4CVSS
5.1AI Score
0.001EPSS
Contacts app for Nextcloud easily syncs contacts from various devices with your Nextcloud and allows editing. The unsanitized SVG is converted to a JavaScript blob (in memory data) that the Avatar can't render. Due to this constellation the missing sanitization does not seem to be exploitable. It i...
4.3CVSS
4.6AI Score
0.001EPSS