icon

We found results for “

CVE-2026-23989

Good to know:

icon
icon

Date: February 6, 2026

Impact A security issue was discovered in Reva based products that enables a malicious user to bypass the scope validation of a public link, allowing it to access resources outside the scope of a public link. Details Public link shares in OpenCloud are bound to a specific scope (usually a file or directory). Anonymous users accessing resources via this public link share are only allowed to access the share resource itself and, in case of a directory or space root, all child resources of it. Due to a bug in the GRPC authorization middleware of the "Reva" component of OpenCloud a malicious user is able to bypass the scope verification. By exploiting this via the the "archiver" service this can be leveraged to create an archive (zip or tar-file) containing all resources that this creator of the public link has access to. It is not possible to bypass the public link scope via "normal" WebDAV requests so it is not possible to exploit this vulnerability via WebDAV. Patches Update to OpenCloud Reva version >= 2.40.3 for the 2.40.x versions. Update to OpenCloud Reva version >= 2.42.3 for the 2.41.x versions Workarounds There is no workaround because one cannot run Reva standalone from this project. Please check the "OpenCloud Advisory" (https://github.com/opencloud-eu/opencloud/security/advisories/GHSA-vf5j-r2hw-2hrw) how to mitigate the problem in an OpenCloud deployment via configuration. For more information If there are any questions or comments about this advisory: - Security Support: "security@opencloud.eu" (mailto:security@opencloud.eu) - Technical Support: "support@opencloud.eu" (mailto:support@opencloud.eu)

Severity Score

Severity Score

Weakness Type (CWE)

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-22

Top Fix

icon

Upgrade Version

Upgrade to version github.com/opencloud-eu/reva/v2 - v2.40.3;github.com/opencloud-eu/reva/v2 - v2.42.3

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): HIGH
Integrity (I): LOW
Availability (A): NONE

Do you need more information?

Contact Us