Description
Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud Talk application was vulnerable to a stored Cross-Site Scripting (XSS) vulnerability. For exploitation, a user would need to right-click on a malicious file and open the file in a new tab. Due the strict Content-Security-Policy shipped with Nextcloud, this issue is not exploitable on modern browsers supporting Content-Security-Policy. It is recommended that the Nextcloud Talk application is upgraded to patched versions 10.0.7, 10.1.4, 11.1.2, 11.2.0 or 12.0.0. As a workaround, use a browser that has support for Content-Security-Policy.
References (3)
Core 3
Core References
Third Party Advisory x_refsource_confirm
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xhxq-f4vg-jw5g
Third Party Advisory x_refsource_misc
https://github.com/nextcloud/spreed/pull/542
Permissions Required, Third Party Advisory x_refsource_misc
https://hackerone.com/reports/1135481
Scores
CVSS v3
6.4
EPSS
0.0043
EPSS Percentile
62.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N
Details
CWE
CWE-434
CWE-79
Status
published
Products (1)
nextcloud/talk
< 10.0.7
Published
Nov 15, 2021
Tracked Since
Feb 18, 2026