CVE-2024-22213

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-22213
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-22213.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-22213
Aliases
  • GHSA-mg7w-x9fm-9wwc
Published
2024-01-18T19:11:40.584Z
Modified
2025-11-30T11:26:47.495326Z
Severity
  • 0.0 (None) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N CVSS Calculator
Summary
Cross-site Scripting when sending HTML as a comment in the Nextcloud Deck app
Details

Deck is a kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. In affected versions users could be tricked into executing malicious code that would execute in their browser via HTML sent as a comment. It is recommended that the Nextcloud Deck is upgraded to version 1.9.5 or 1.11.2. There are no known workarounds for this vulnerability.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/22xxx/CVE-2024-22213.json",
    "cwe_ids": [
        "CWE-79"
    ]
}
References

Affected packages

Git / github.com/nextcloud/deck

Affected ranges

Type
GIT
Repo
https://github.com/nextcloud/deck
Events
Database specific
{
    "versions": [
        {
            "introduced": "1.9.0"
        },
        {
            "fixed": "1.9.5"
        }
    ]
}
Type
GIT
Repo
https://github.com/nextcloud/deck
Events
Database specific
{
    "versions": [
        {
            "introduced": "1.10.0"
        },
        {
            "fixed": "1.11.2"
        }
    ]
}

Affected versions

v1.*

v1.10.0
v1.11.0
v1.11.0-beta.1
v1.11.1
v1.9.0
v1.9.1
v1.9.2
v1.9.3
v1.9.4

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-22213.json"