Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66208: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in CollaboraOnline online

0
High
VulnerabilityCVE-2025-66208cvecve-2025-66208cwe-78
Published: Wed Dec 03 2025 (12/03/2025, 18:25:59 UTC)
Source: CVE Database V5
Vendor/Project: CollaboraOnline
Product: online

Description

CVE-2025-66208 is a high-severity OS command injection vulnerability affecting Collabora Online's built-in CODE Server (richdocumentscode proxy) in versions prior to 25. 04. 702. This flaw allows unauthenticated remote attackers to execute arbitrary OS commands via the proxy. php interface, particularly when used with Nextcloud and an intermediate reverse proxy. The vulnerability arises from improper neutralization of special elements in OS commands (CWE-78). No user interaction or privileges are required, and the vulnerability has not yet been observed exploited in the wild. The issue is fixed in version 25. 04. 702.

AI-Powered Analysis

AILast updated: 12/10/2025, 18:37:26 UTC

Technical Analysis

CVE-2025-66208 is an OS command injection vulnerability identified in Collabora Online's built-in CODE Server component, specifically within the richdocumentscode proxy. Collabora Online provides document editing capabilities often integrated with platforms like Nextcloud. Versions prior to 25.04.702 contain a flaw where input passed through proxy.php is not properly sanitized, allowing attackers to inject arbitrary OS commands. This vulnerability is configuration-dependent but can be exploited remotely without authentication or user interaction, leveraging the proxy.php endpoint and potentially an intermediate reverse proxy setup. The vulnerability is classified under CWE-78, indicating improper neutralization of special elements in OS commands. Exploitation could lead to remote code execution (RCE), enabling attackers to run arbitrary commands on the host system, potentially leading to full system compromise. The CVSS 4.0 base score is 7.2 (high), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no exploits have been reported in the wild yet, the severity and ease of exploitation make this a critical patching priority. The issue was publicly disclosed on December 3, 2025, and fixed in version 25.04.702 of Collabora Online.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially those deploying Collabora Online integrated with Nextcloud for document collaboration. Successful exploitation could allow attackers to execute arbitrary commands on servers, leading to data theft, service disruption, or lateral movement within networks. Confidentiality could be compromised by unauthorized data access; integrity could be affected by unauthorized modification of documents or system files; availability could be disrupted by service outages or destruction of data. Given the widespread use of Nextcloud and Collabora Online in European public sector, education, and private enterprises, the impact could be broad. Attackers could leverage this vulnerability to target sensitive government or corporate documents, disrupt business operations, or establish persistent footholds. The lack of required authentication and user interaction increases the risk of automated exploitation campaigns. Organizations failing to patch may face regulatory compliance issues under GDPR if personal data is compromised.

Mitigation Recommendations

European organizations should immediately upgrade Collabora Online to version 25.04.702 or later to remediate this vulnerability. Until patching is possible, administrators should restrict access to the proxy.php endpoint via network controls such as IP whitelisting or firewall rules, especially blocking access from untrusted networks. Deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious command injection patterns targeting proxy.php can provide temporary protection. Monitoring logs for unusual command execution attempts or proxy.php access patterns is critical for early detection. Organizations should also review and harden the configuration of any intermediate reverse proxies to minimize exposure. Regularly auditing and limiting permissions of the Collabora Online service account can reduce potential damage from exploitation. Finally, integrating vulnerability management processes to ensure timely updates of collaboration software is essential to prevent exploitation of similar future vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-24T23:01:29.677Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693081947d648701e0f8358f

Added to database: 12/3/2025, 6:29:40 PM

Last enriched: 12/10/2025, 6:37:26 PM

Last updated: 1/19/2026, 5:50:16 AM

Views: 134

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats