Program Overview
Nextcloud runs a vulnerability disclosure program on HackerOne. The program has 94 in-scope assets.
In-Scope Assets
| Asset | Type | Max Severity | Eligible |
|---|---|---|---|
| Desktop Client | DOWNLOADABLE_EXECUTABLES | Critical | No Bounty |
| apps.nextcloud.com | URL | Critical | No Bounty |
| auth.nextcloud.com | URL | Critical | No Bounty |
| com.nextcloud.Talk | APPLE_STORE_APP_ID | Medium | No Bounty |
| com.nextcloud.client | GOOGLE_PLAY_APP_ID | Medium | No Bounty |
| com.nextcloud.talk2 | GOOGLE_PLAY_APP_ID | Medium | No Bounty |
| com.peterandlinda.iOCNotes | APPLE_STORE_APP_ID | Critical | No Bounty |
| crm.nextcloud.com | URL | Critical | No Bounty |
| customerupdates.nextcloud.com | URL | Critical | No Bounty |
| docs.nextcloud.com | URL | Critical | No Bounty |
| download.nextcloud.com | URL | Critical | No Bounty |
| help.nextcloud.com | URL | Critical | No Bounty |
| https://github.com/nextcloud/collectives | SOURCE_CODE | Critical | No Bounty |
| https://github.com/nextcloud/files_confidential | SOURCE_CODE | Critical | No Bounty |
| https://github.com/nextcloud/tables | SOURCE_CODE | Critical | No Bounty |
| https://github.com/roundcube/roundcubemail | SOURCE_CODE | Critical | No Bounty |
| it.niedermann.owncloud.notes | GOOGLE_PLAY_APP_ID | Medium | No Bounty |
| it.twsweb.Nextcloud | APPLE_STORE_APP_ID | Medium | No Bounty |
| knowledge.nextcloud.com | URL | Critical | No Bounty |
| lists.nextcloud.com | URL | Critical | No Bounty |
| logs.nextcloud.com | URL | Critical | No Bounty |
| lookup.nextcloud.com | URL | Critical | No Bounty |
| newsletter.nextcloud.com | URL | Low | No Bounty |
| nextcloud.com | URL | Critical | No Bounty |
| nextcloud/3rdparty | SOURCE_CODE | Critical | No Bounty |
| nextcloud/activity | SOURCE_CODE | Critical | No Bounty |
| nextcloud/approval | SOURCE_CODE | Critical | No Bounty |
| nextcloud/bruteforcesettings | SOURCE_CODE | Critical | No Bounty |
| nextcloud/calendar | SOURCE_CODE | Critical | No Bounty |
| nextcloud/calendar_resource_management | SOURCE_CODE | Critical | No Bounty |
| nextcloud/circles | SOURCE_CODE | Critical | No Bounty |
| nextcloud/contacts | SOURCE_CODE | Critical | No Bounty |
| nextcloud/data_request | SOURCE_CODE | Critical | No Bounty |
| nextcloud/deck | SOURCE_CODE | Critical | No Bounty |
| nextcloud/end_to_end_encryption | SOURCE_CODE | Critical | No Bounty |
| nextcloud/external | SOURCE_CODE | Critical | No Bounty |
| nextcloud/files_accesscontrol | SOURCE_CODE | Critical | No Bounty |
| nextcloud/files_antivirus | SOURCE_CODE | Critical | No Bounty |
| nextcloud/files_automatedtagging | SOURCE_CODE | Critical | No Bounty |
| nextcloud/files_fulltextsearch | SOURCE_CODE | Critical | No Bounty |
| nextcloud/files_fulltextsearch_tesseract | SOURCE_CODE | Critical | No Bounty |
| nextcloud/files_lock | SOURCE_CODE | Critical | No Bounty |
| nextcloud/files_pdfviewer | SOURCE_CODE | Critical | No Bounty |
| nextcloud/files_retention | SOURCE_CODE | Critical | No Bounty |
| nextcloud/files_rightclick | SOURCE_CODE | Critical | No Bounty |
| nextcloud/files_texteditor | SOURCE_CODE | Critical | No Bounty |
| nextcloud/firstrunwizard | SOURCE_CODE | Critical | No Bounty |
| nextcloud/flow_notifications | SOURCE_CODE | Critical | No Bounty |
| nextcloud/fulltextsearch | SOURCE_CODE | Critical | No Bounty |
| nextcloud/fulltextsearch_elasticsearch | SOURCE_CODE | Critical | No Bounty |
Showing 50 of 94 in-scope assets. View all on HackerOne.
Out-of-Scope Assets
- cloud.nextcloud.com
- conf.nextcloud.com
- daita/files_fulltextsearch_tesseract
- demo.nextcloud.com
- drone.nextcloud.com
- https://nextcloud.atlassian.net/jira/dashboard
- sentry.nextcloud.com
- try.nextcloud.com
Tips for Hacking Nextcloud
- Read the policy — Understand what's in scope, out of scope, and any specific testing restrictions before you start.
- Enumerate the attack surface — Use subdomain enumeration and directory bruteforcing to map all accessible endpoints.
- Focus on high-impact bugs — Look for SQL injection, SSRF, and IDOR vulnerabilities first.
- Test authentication flows — Check for OAuth misconfigurations and CSRF in login/signup flows.
- Write clear reports — Include steps to reproduce, impact assessment, and suggested remediation. Use Burp Suite to capture evidence.
Frequently Asked Questions
How do I start hacking Nextcloud?
Sign up on HackerOne, read the program policy carefully, review the in-scope assets listed above, and start testing. Always stay within scope and follow responsible disclosure guidelines.
Does Nextcloud pay bounties?
No, Nextcloud runs a Vulnerability Disclosure Program (VDP) without monetary rewards. You may receive recognition or swag.
What types of vulnerabilities does Nextcloud accept?
Nextcloud accepts reports for vulnerabilities found in their 94 in-scope assets. Common accepted vulnerability types include XSS, SQL injection, SSRF, IDOR, authentication bypass, and RCE. Check the program policy for specific exclusions.