CVE-2022-39339: CWE-319: Cleartext Transmission of Sensitive Information in nextcloud security-advisories
user_oidc is an OpenID Connect user backend for Nextcloud. In versions prior to 1.2.1 sensitive information such as the OIDC client credentials and tokens are sent in plain text of HTTP without TLS. Any malicious actor with access to monitor user traffic may have been able to compromise account security. This issue has been addressed in in user_oidc v1.2.1. Users are advised to upgrade. Users unable to upgrade may use https to access Nextcloud. Set an HTTPS discovery URL in the provider settings (in Nextcloud OIDC admin settings).
AI Analysis
Technical Summary
CVE-2022-39339 is a vulnerability identified in the user_oidc OpenID Connect user backend for Nextcloud, specifically affecting versions prior to 1.2.1. The core issue involves the cleartext transmission of sensitive information, including OIDC client credentials and tokens, over HTTP without the protection of TLS encryption. This vulnerability falls under CWE-319, which concerns the exposure of sensitive data due to unencrypted communication channels. When user_oidc is configured to communicate over plain HTTP, any attacker with network access capable of monitoring traffic—such as those on the same local network, compromised routers, or ISP-level surveillance—could intercept these credentials and tokens. This interception could lead to unauthorized access to user accounts or broader Nextcloud instances. The vulnerability does not require user interaction beyond normal usage and does not require authentication to exploit, as it targets the transmission channel itself. The issue was addressed in user_oidc version 1.2.1 by enforcing or recommending the use of HTTPS for all communications. Users who cannot upgrade are advised to configure Nextcloud to use HTTPS by setting an HTTPS discovery URL in the OIDC provider settings, ensuring that sensitive tokens and credentials are transmitted securely. No known exploits in the wild have been reported, but the risk remains significant due to the nature of the data exposed and the ease of interception in unencrypted networks.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for those relying on Nextcloud for collaboration, file sharing, and identity management. The exposure of OIDC client credentials and tokens could lead to unauthorized access to sensitive corporate data, user impersonation, and potential lateral movement within networks. This risk is heightened in environments with shared or public networks, such as universities, co-working spaces, or enterprises with remote workers using unsecured Wi-Fi. Compromise of authentication tokens could also undermine trust in federated identity systems, leading to broader security incidents. Given the widespread adoption of Nextcloud in Europe, particularly among public sector entities, educational institutions, and SMEs seeking open-source cloud solutions, the vulnerability could affect a significant number of users. Additionally, the GDPR framework imposes strict data protection requirements, and a breach resulting from this vulnerability could lead to regulatory penalties and reputational damage. The absence of known exploits reduces immediate risk but does not eliminate the potential for targeted attacks, especially by threat actors monitoring unencrypted traffic in strategic sectors.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize upgrading the user_oidc backend to version 1.2.1 or later, which includes fixes to enforce secure transmission. For environments where immediate upgrading is not feasible, administrators must ensure that Nextcloud is accessed exclusively over HTTPS by configuring an HTTPS discovery URL in the OIDC provider settings. This configuration change forces the use of TLS, preventing cleartext transmission of sensitive tokens and credentials. Network administrators should also implement network-level protections such as enforcing HTTPS via HSTS policies, deploying network segmentation to limit exposure of sensitive traffic, and monitoring network traffic for unencrypted OIDC communications. Additionally, organizations should audit their Nextcloud configurations and user_oidc versions regularly, integrate vulnerability scanning into their patch management processes, and educate users about the risks of using unsecured networks. Deploying endpoint security solutions capable of detecting anomalous authentication token usage can further reduce risk. Finally, organizations should consider deploying network intrusion detection systems (NIDS) tuned to detect suspicious OIDC traffic patterns indicative of interception or replay attacks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Austria, Poland
CVE-2022-39339: CWE-319: Cleartext Transmission of Sensitive Information in nextcloud security-advisories
Description
user_oidc is an OpenID Connect user backend for Nextcloud. In versions prior to 1.2.1 sensitive information such as the OIDC client credentials and tokens are sent in plain text of HTTP without TLS. Any malicious actor with access to monitor user traffic may have been able to compromise account security. This issue has been addressed in in user_oidc v1.2.1. Users are advised to upgrade. Users unable to upgrade may use https to access Nextcloud. Set an HTTPS discovery URL in the provider settings (in Nextcloud OIDC admin settings).
AI-Powered Analysis
Technical Analysis
CVE-2022-39339 is a vulnerability identified in the user_oidc OpenID Connect user backend for Nextcloud, specifically affecting versions prior to 1.2.1. The core issue involves the cleartext transmission of sensitive information, including OIDC client credentials and tokens, over HTTP without the protection of TLS encryption. This vulnerability falls under CWE-319, which concerns the exposure of sensitive data due to unencrypted communication channels. When user_oidc is configured to communicate over plain HTTP, any attacker with network access capable of monitoring traffic—such as those on the same local network, compromised routers, or ISP-level surveillance—could intercept these credentials and tokens. This interception could lead to unauthorized access to user accounts or broader Nextcloud instances. The vulnerability does not require user interaction beyond normal usage and does not require authentication to exploit, as it targets the transmission channel itself. The issue was addressed in user_oidc version 1.2.1 by enforcing or recommending the use of HTTPS for all communications. Users who cannot upgrade are advised to configure Nextcloud to use HTTPS by setting an HTTPS discovery URL in the OIDC provider settings, ensuring that sensitive tokens and credentials are transmitted securely. No known exploits in the wild have been reported, but the risk remains significant due to the nature of the data exposed and the ease of interception in unencrypted networks.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for those relying on Nextcloud for collaboration, file sharing, and identity management. The exposure of OIDC client credentials and tokens could lead to unauthorized access to sensitive corporate data, user impersonation, and potential lateral movement within networks. This risk is heightened in environments with shared or public networks, such as universities, co-working spaces, or enterprises with remote workers using unsecured Wi-Fi. Compromise of authentication tokens could also undermine trust in federated identity systems, leading to broader security incidents. Given the widespread adoption of Nextcloud in Europe, particularly among public sector entities, educational institutions, and SMEs seeking open-source cloud solutions, the vulnerability could affect a significant number of users. Additionally, the GDPR framework imposes strict data protection requirements, and a breach resulting from this vulnerability could lead to regulatory penalties and reputational damage. The absence of known exploits reduces immediate risk but does not eliminate the potential for targeted attacks, especially by threat actors monitoring unencrypted traffic in strategic sectors.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize upgrading the user_oidc backend to version 1.2.1 or later, which includes fixes to enforce secure transmission. For environments where immediate upgrading is not feasible, administrators must ensure that Nextcloud is accessed exclusively over HTTPS by configuring an HTTPS discovery URL in the OIDC provider settings. This configuration change forces the use of TLS, preventing cleartext transmission of sensitive tokens and credentials. Network administrators should also implement network-level protections such as enforcing HTTPS via HSTS policies, deploying network segmentation to limit exposure of sensitive traffic, and monitoring network traffic for unencrypted OIDC communications. Additionally, organizations should audit their Nextcloud configurations and user_oidc versions regularly, integrate vulnerability scanning into their patch management processes, and educate users about the risks of using unsecured networks. Deploying endpoint security solutions capable of detecting anomalous authentication token usage can further reduce risk. Finally, organizations should consider deploying network intrusion detection systems (NIDS) tuned to detect suspicious OIDC traffic patterns indicative of interception or replay attacks.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-09-02T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9846c4522896dcbf48f2
Added to database: 5/21/2025, 9:09:26 AM
Last enriched: 6/22/2025, 3:05:16 PM
Last updated: 2/3/2026, 10:39:45 AM
Views: 39
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-8461: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Seres Software syWEB
HighResearchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
MediumCVE-2025-8456: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Kod8 Software Technologies Trade Ltd. Co. Kod8 Individual and SME Website
HighCVE-2024-34021: Unrestricted upload of file with dangerous type in ELECOM CO.,LTD. WRC-1167GST2
MediumCVE-2024-25579: OS command injection in ELECOM CO.,LTD. WRC-1167GS2-B
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.