CVE-2023-32318

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-32318
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-32318.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-32318
Aliases
  • GHSA-q8c4-chpj-6v38
Published
2023-05-26T17:21:17.942Z
Modified
2025-11-28T09:38:50.349351Z
Severity
  • 7.2 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N CVSS Calculator
Summary
User session not correctly destroyed on logout
Details

Nextcloud server provides a home for data. A regression in the session handling between Nextcloud Server and the Nextcloud Text app prevented a correct destruction of the session on logout if cookies were not cleared manually. After successfully authenticating with any other account the previous session would be continued and the attacker would be authenticated as the previously logged in user. It is recommended that the Nextcloud Server is upgraded to 25.0.6 or 26.0.1.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/32xxx/CVE-2023-32318.json",
    "cwe_ids": [
        "CWE-613"
    ]
}
References

Affected packages

Git / github.com/nextcloud/server

Affected ranges

Type
GIT
Repo
https://github.com/nextcloud/server
Events

Affected versions

v25.*

v25.0.2
v25.0.3
v25.0.3rc1
v25.0.3rc2
v25.0.4
v25.0.4rc1
v25.0.5
v25.0.5rc1
v25.0.6rc1

Git / github.com/nextcloud/text

Affected ranges

Type
GIT
Repo
https://github.com/nextcloud/text
Events
Database specific
{
    "versions": [
        {
            "introduced": "25.0.2"
        },
        {
            "fixed": "25.0.6"
        }
    ]
}
Type
GIT
Repo
https://github.com/nextcloud/text
Events
Database specific
{
    "versions": [
        {
            "introduced": "26.0.0"
        },
        {
            "fixed": "26.0.1"
        }
    ]
}

Affected versions

v25.*

v25.0.2
v25.0.3
v25.0.3rc1
v25.0.3rc2
v25.0.4
v25.0.4rc1
v25.0.5
v25.0.5rc1
v25.0.6rc1

v26.*

v26.0.0
v26.0.1rc1