Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 07 Jan 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Owncloud guests
|
|
| CPEs | cpe:2.3:a:owncloud:guests:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Owncloud guests
|
Thu, 06 Nov 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Owncloud
Owncloud owncloud |
|
| Vendors & Products |
Owncloud
Owncloud owncloud |
Wed, 05 Nov 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-200 CWE-203 |
|
| Metrics |
cvssV3_1
|
Wed, 05 Nov 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ownCloud Guests before 0.12.5 allows unauthenticated user enumeration via the /apps/guests/register/{email}/{token} endpoint. Because of insufficient validation of the supplied token in showPasswordForm, the server responds differently when an e-mail address corresponds to a valid pending guest user rather than a non-existent user. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-05T20:10:32.262Z
Reserved: 2025-09-19T00:00:00.000Z
Link: CVE-2025-59716
Updated: 2025-11-05T20:08:47.340Z
Status : Analyzed
Published: 2025-11-05T17:15:44.800
Modified: 2026-01-07T17:05:23.640
Link: CVE-2025-59716
No data.
OpenCVE Enrichment
Updated: 2025-11-06T10:07:02Z