Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58051: CWE-841: Improper Enforcement of Behavioral Workflow in nextcloud security-advisories

0
Medium
VulnerabilityCVE-2025-58051cvecve-2025-58051cwe-841
Published: Thu Oct 16 2025 (10/16/2025, 16:48:19 UTC)
Source: CVE Database V5
Vendor/Project: nextcloud
Product: security-advisories

Description

Nextcloud Tables allows you to create your own tables with individual columns. Prior 0.7.6, 0.8.8, and 0.9.5, when importing a table, a user was able to specify files on the server and when their format is supported by the used PhpSpreadsheet library they would be included and their content leaked to the user. It is recommended that the Nextcloud Tables app is upgraded to 0.7.6, 0.8.8 or 0.9.5.

AI-Powered Analysis

AILast updated: 10/16/2025, 17:14:35 UTC

Technical Analysis

CVE-2025-58051 is a vulnerability affecting the Nextcloud Tables application, specifically versions prior to 0.7.6, 0.8.8, and 0.9.5. Nextcloud Tables enables users to create custom tables with individual columns and supports importing table data. The vulnerability arises because the import functionality improperly enforces behavioral workflow constraints, allowing an authenticated user with limited privileges to specify arbitrary file paths on the server during the import process. If the specified files are in formats supported by the PhpSpreadsheet library, the application processes and includes their content in the imported table data, effectively leaking the contents of arbitrary server files to the attacker. This is classified under CWE-841, indicating improper enforcement of behavioral workflow, which in this case means the application fails to restrict file import sources appropriately. The CVSS 3.1 base score is 6.5 (medium severity), with an attack vector of network, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality only. The vulnerability does not affect data integrity or availability. No public exploits are known at this time. The recommended mitigation is upgrading Nextcloud Tables to versions 0.7.6, 0.8.8, or 0.9.5 or later, where this issue has been addressed. Organizations using vulnerable versions should audit their deployments and apply patches promptly to prevent unauthorized data disclosure.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized disclosure of sensitive server-side files through the Nextcloud Tables import feature. Since Nextcloud is widely used in Europe for collaboration and file sharing, especially in public sector, education, and enterprises, the exposure of confidential data could lead to privacy violations, regulatory non-compliance (e.g., GDPR), and reputational damage. The vulnerability requires authenticated access, so insider threats or compromised user accounts could exploit it to leak sensitive information. Although it does not affect system integrity or availability, the confidentiality breach could expose intellectual property, personal data, or configuration files, potentially facilitating further attacks. Organizations relying on Nextcloud Tables for data management should consider this a significant data leakage risk and prioritize remediation to maintain compliance and trust.

Mitigation Recommendations

1. Upgrade Nextcloud Tables to versions 0.7.6, 0.8.8, or 0.9.5 or later immediately to apply the fix for this vulnerability. 2. Restrict user permissions to minimize the number of users who can import tables, especially limiting access to trusted users only. 3. Implement strict monitoring and logging of import activities within Nextcloud to detect any unusual file import attempts referencing server files. 4. Conduct regular audits of file permissions and server file accessibility to reduce the risk of sensitive files being accessible through the import process. 5. Employ network segmentation and access controls to limit exposure of Nextcloud servers to only trusted networks and users. 6. Educate users about the risks of importing data from untrusted sources and enforce strong authentication mechanisms to prevent account compromise. 7. Consider additional application-layer controls or custom filters to validate imported file paths if upgrading is delayed.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-08-22T14:30:32.221Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f124619f8a5dbaeaea87b8

Added to database: 10/16/2025, 4:59:13 PM

Last enriched: 10/16/2025, 5:14:35 PM

Last updated: 10/19/2025, 12:43:43 PM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats