Security Advisory

Back to advisories

Arbitrary code execution in desktop client via OpenSSL config (NC-SA-2020-030)

10th July 2020

Risk level: Low

CVSS v3 Base Score: 4.8 (AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L)

CWE: Improper Control of Generation of Code (Code Injection) (CWE-94)

HackerOne report: 622170


A code injection in Nextcloud Desktop Client 2.6.4 allowed to load arbitrary code when placing a malicious OpenSSL config into a fixed directory.

Affected Software

  • Nextcloud Desktop < 2.6.5 (CVE-2020-8224)

Action Taken

The error has been fixed.


It is recommended that the Nextcloud Desktop Client is upgraded to 2.6.5.


The Nextcloud team thanks the following people for their research and responsible disclosure of the above advisory:

This advisory is licensed CC BY-SA 4.0.

You have javascript disabled. We tried to make sure the basics of our website work but some functionality will be missing.

This website is using cookies. By visiting you agree with our privacy policy. That's Fine