{"id":"CVE-2021-32800","details":"Nextcloud server is an open source, self hosted personal cloud. In affected versions an attacker is able to bypass Two Factor Authentication in Nextcloud. Thus knowledge of a password, or access to a WebAuthN trusted device of a user was sufficient to gain access to an account. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. There are no workaround for this vulnerability.","modified":"2026-04-12T03:27:08.396546Z","published":"2021-09-07T22:15:08.417Z","related":["GHSA-gv5w-8q25-785v","openSUSE-SU-2021:1250-1","openSUSE-SU-2021:1252-1","openSUSE-SU-2021:1253-1","openSUSE-SU-2021:1255-1","openSUSE-SU-2021:1275-1"],"references":[{"type":"ADVISORY","url":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gv5w-8q25-785v"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202208-17"},{"type":"REPORT","url":"https://hackerone.com/reports/1271052"},{"type":"FIX","url":"https://github.com/nextcloud/server/pull/28078"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/nextcloud/server","events":[{"introduced":"0"},{"fixed":"a09a7fc6ae1c18aeba4fef5775a670aea8003890"},{"introduced":"8985b7930653139859002eb3eca2852999ed8f0d"},{"fixed":"c52fea0b16690b492f6c4175e1ae71d488936244"},{"introduced":"c67e1420c8f741bfa43db08fcc295ec3b156fff8"},{"fixed":"a45d94af7b5480c695da9f3fdc775d9afa7decfa"}],"database_specific":{"source":"CPE_FIELD","cpe":"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"fixed":"20.0.12"},{"introduced":"21.0.0"},{"fixed":"21.0.4"},{"introduced":"22.0.0"},{"fixed":"22.1.0"}]}}],"versions":["20.0.12rc1","v1.0.0beta1","v11.0.0","v11.0RC2","v12.0.0beta1","v12.0.0beta2","v12.0.0beta3","v12.0.0beta4","v13.0.0RC1","v13.0.0beta1","v13.0.0beta2","v13.0.0beta3","v13.0.0beta4","v14.0.0RC1","v14.0.0RC2","v14.0.0beta1","v14.0.0beta2","v14.0.0beta3","v14.0.0beta4","v15.0.0RC1","v15.0.0beta1","v15.0.0beta2","v16.0.0RC1","v16.0.0alpha1","v16.0.0beta1","v16.0.0beta2","v16.0.0beta3","v17.0.0beta1","v17.0.0beta2","v17.0.0beta3","v17.0.0beta4","v18.0.0RC1","v18.0.0beta1","v18.0.0beta2","v18.0.0beta3","v18.0.0beta4","v19.0.0RC1","v19.0.0RC2","v19.0.0beta1","v19.0.0beta2","v19.0.0beta3","v19.0.0beta4","v19.0.0beta5","v19.0.0beta6","v19.0.0beta7","v20.0.0","v20.0.0RC1","v20.0.0RC2","v20.0.0beta1","v20.0.0beta2","v20.0.0beta3","v20.0.0beta4","v20.0.1","v20.0.10","v20.0.10RC1","v20.0.11","v20.0.11rc1","v20.0.1RC1","v20.0.2","v20.0.2RC1","v20.0.2RC2","v20.0.3","v20.0.3RC2","v20.0.4","v20.0.5","v20.0.5RC1","v20.0.5RC2","v20.0.6","v20.0.6RC1","v20.0.7","v20.0.7RC1","v20.0.8","v20.0.8RC1","v20.0.9","v20.0.9RC1","v21.0.0","v21.0.1","v21.0.1RC1","v21.0.2","v21.0.2RC1","v21.0.3","v21.0.3rc1","v21.0.4rc1","v22.0.0","v22.1.0rc1","v3.0","v4.0.0","v4.0.0RC","v4.0.0RC2","v4.0.0beta","v4.0.1","v4.0.4","v4.0.5","v4.0.6","v4.5.0","v4.5.0RC1","v4.5.0RC2","v4.5.0RC3","v4.5.0beta3","v4.5.0beta4","v5.0.0","v5.0.0RC1","v5.0.0RC2","v5.0.0RC3","v5.0.0alpha1","v5.0.0beta1","v5.0.0beta2","v6.0.0RC1","v6.0.0RC2","v6.0.0alpha2","v6.0.0beta2","v6.0.0beta3","v6.0.0beta4","v6.0.0beta5","v7.0.0alpha2","v7.0.0beta1","v8.0.0","v8.0.0RC1","v8.0.0RC2","v8.0.0alpha1","v8.0.0alpha2","v8.0.0beta1","v8.0.0beta2","v8.1.0alpha1","v8.1.0alpha2","v8.1.0beta1","v8.1.0beta2","v8.1RC2","v8.2RC1","v8.2beta1","v9.0.0beta2","v9.0beta1","v9.1.0beta1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-32800.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"}]}