Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66510: CWE-359: Exposure of Private Personal Information to an Unauthorized Actor in nextcloud security-advisories

0
Medium
VulnerabilityCVE-2025-66510cvecve-2025-66510cwe-359
Published: Fri Dec 05 2025 (12/05/2025, 16:18:53 UTC)
Source: CVE Database V5
Vendor/Project: nextcloud
Product: security-advisories

Description

Nextcloud Server is a self hosted personal cloud system. In Nextcloud Server prior to 31.0.10 and 32.0.1 and Nextcloud Enterprise Server prior to 28.0.14.11, 29.0.16.8, 30.0.17.3, and 31.0.10, contacts search allowed to retrieve personal data of other users (emails, names, identifiers) without proper access control. This allows an authenticated user to retrieve information about accounts that are not related or added as contacts.

AI-Powered Analysis

AILast updated: 12/12/2025, 17:37:31 UTC

Technical Analysis

CVE-2025-66510 is a vulnerability identified in Nextcloud Server and Enterprise Server versions prior to 31.0.10 and 32.0.1, respectively. Nextcloud is a widely used self-hosted cloud storage and collaboration platform. The vulnerability stems from a flaw in the contacts search feature, which improperly enforces access controls. Authenticated users can exploit this flaw to retrieve personal information—such as email addresses, full names, and unique identifiers—of other users who are not in their contact lists or otherwise authorized to be visible. This exposure violates user privacy and confidentiality principles. The vulnerability is categorized under CWE-359, which concerns the exposure of private personal information to unauthorized actors. The CVSS v3.1 base score is 4.5 (medium severity), reflecting that the attack vector is network-based (AV:N), requires low attack complexity (AC:L), but needs high privileges (PR:H) and user interaction (UI:R). The scope remains unchanged (S:U), and the impact is limited to confidentiality (C:H), with no impact on integrity or availability. No public exploits have been reported yet, but the vulnerability presents a significant privacy risk, especially in environments with sensitive or regulated data. The flaw affects multiple Nextcloud versions, including 31.x and 32.x branches, necessitating updates to versions 31.0.10, 32.0.1, or later to remediate the issue.

Potential Impact

The primary impact of CVE-2025-66510 is the unauthorized disclosure of private personal information within Nextcloud deployments. For European organizations, this can lead to violations of the EU General Data Protection Regulation (GDPR), resulting in legal penalties, reputational damage, and loss of customer trust. The exposure of emails, names, and identifiers could facilitate targeted phishing attacks, social engineering, or identity theft. Although the vulnerability does not affect data integrity or availability, the confidentiality breach alone is significant, especially for sectors handling sensitive personal or business data such as healthcare, finance, and government. Organizations relying on Nextcloud for internal collaboration or customer data storage are at risk of inadvertent data leaks to unauthorized internal users. The requirement for authenticated access limits exploitation to insiders or compromised accounts, but this does not eliminate risk, as insider threats or credential theft are common attack vectors. The absence of known exploits in the wild provides a window for remediation but should not lead to complacency.

Mitigation Recommendations

1. Immediate patching: Upgrade Nextcloud Server and Enterprise Server to versions 31.0.10, 32.0.1, or later where the vulnerability is fixed. 2. Access control review: Audit and tighten user permissions and roles within Nextcloud to minimize the number of users with access to contacts search functionality. 3. Monitor authentication logs: Implement enhanced monitoring for unusual authenticated user behavior that could indicate attempts to exploit this vulnerability. 4. User awareness: Educate users about the risks of credential compromise and phishing, as exploitation requires authentication. 5. Network segmentation: Restrict Nextcloud access to trusted networks or VPNs to reduce exposure to unauthorized actors. 6. Data minimization: Limit the amount of personal information stored or displayed in contacts to the minimum necessary. 7. Incident response readiness: Prepare to respond to potential data exposure incidents, including notification procedures compliant with GDPR. 8. Regular vulnerability scanning: Incorporate checks for Nextcloud vulnerabilities in routine security assessments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-03T15:12:22.978Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693308e8f88dbe026cf79155

Added to database: 12/5/2025, 4:31:36 PM

Last enriched: 12/12/2025, 5:37:31 PM

Last updated: 1/20/2026, 6:29:15 PM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats