{"id":"CVE-2021-32726","details":"Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.011, and 21.0.3, webauthn tokens were not deleted after a user has been deleted. If a victim reused an earlier used username, the previous user could gain access to their account. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. There are no known workarounds.","modified":"2026-02-13T08:46:00.246016Z","published":"2021-07-12T20:15:10.037Z","related":["GHSA-6qr9-c846-j8mg","openSUSE-SU-2021:1068-1"],"references":[{"type":"ADVISORY","url":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6qr9-c846-j8mg"},{"type":"ADVISORY","url":"https://github.com/nextcloud/server/pull/27532"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202208-17"},{"type":"REPORT","url":"https://hackerone.com/reports/1202590"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/nextcloud/server","events":[{"introduced":"0"},{"fixed":"3845aa47869e6787bf9b25cae59f9b999c6f7807"},{"introduced":"615b994816710a595243d704c9be445f736b4b41"},{"fixed":"3eb0ce9892933c36672e8ba35e771e48a5309321"},{"introduced":"8985b7930653139859002eb3eca2852999ed8f0d"},{"fixed":"5d04a3fed226c370feca686032f47d5422b02bb2"}]}],"versions":["v20.0.0","v20.0.1","v20.0.10","v20.0.10RC1","v20.0.11rc1","v20.0.1RC1","v20.0.2","v20.0.2RC1","v20.0.2RC2","v20.0.3","v20.0.3RC2","v20.0.4","v20.0.5","v20.0.5RC1","v20.0.5RC2","v20.0.6","v20.0.6RC1","v20.0.7","v20.0.7RC1","v20.0.8","v20.0.8RC1","v20.0.9","v20.0.9RC1","v21.0.0","v21.0.1","v21.0.1RC1","v21.0.2","v21.0.2RC1","v21.0.3rc1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-32726.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}