Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66513: CWE-639: Authorization Bypass Through User-Controlled Key in nextcloud security-advisories

0
Medium
VulnerabilityCVE-2025-66513cvecve-2025-66513cwe-639
Published: Fri Dec 05 2025 (12/05/2025, 17:11:19 UTC)
Source: CVE Database V5
Vendor/Project: nextcloud
Product: security-advisories

Description

CVE-2025-66513 is a medium severity authorization bypass vulnerability in Nextcloud Tables versions prior to 0. 8. 9, 0. 9. 6, and 1. 0. 1. It allows unauthorized users to access information about which tables are shared with which groups or users and their permissions, due to insufficient access control on user-controlled keys. Exploitation requires network access and some user interaction but no privileges. The vulnerability impacts confidentiality but not integrity or availability.

AI-Powered Analysis

AILast updated: 12/12/2025, 19:14:54 UTC

Technical Analysis

CVE-2025-66513 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting Nextcloud Tables, a component that allows users to create custom tables with individual columns. The flaw exists in versions prior to 0.8.9, 0.9.6, and 1.0.1, where the mechanism controlling access to metadata about table sharing—specifically which numeric table IDs are shared with which groups or users and their associated permissions—was insufficiently restricted. This means that non-privileged users could query or infer sharing information that should have been limited to privileged users only. The vulnerability arises because the key controlling access is user-controlled and not properly validated or authorized by the system, allowing unauthorized disclosure of sharing configurations. The CVSS 3.1 score is 4.3 (medium), reflecting that the attack vector is network-based, requires no privileges but does require user interaction, and impacts confidentiality only, without affecting integrity or availability. The vulnerability does not require authentication but does require user interaction, such as accessing a crafted link or interface. No known exploits have been reported in the wild as of the publication date. The issue was addressed by Nextcloud in versions 0.8.9, 0.9.6, and 1.0.1 by enforcing proper access control checks on the sharing metadata keys, ensuring only authorized users can retrieve sharing information. This vulnerability could allow attackers to gather sensitive information about data sharing relationships within an organization, potentially aiding further targeted attacks or social engineering.

Potential Impact

For European organizations, this vulnerability primarily threatens confidentiality by exposing sensitive metadata about data sharing within Nextcloud Tables. Attackers could identify which tables are shared with which users or groups, revealing organizational structure, collaboration patterns, or sensitive project information. This could facilitate targeted phishing, social engineering, or reconnaissance for more severe attacks. Although the vulnerability does not directly compromise data integrity or availability, the leakage of sharing information can undermine trust and compliance with data protection regulations such as GDPR, especially if the shared data is sensitive or regulated. Organizations relying on Nextcloud for internal collaboration and document management are at risk of unauthorized disclosure of sharing relationships, which could have reputational and operational consequences. The medium severity rating indicates moderate risk, but the ease of exploitation without privileges means organizations should prioritize patching. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.

Mitigation Recommendations

European organizations using Nextcloud Tables should immediately verify their version and upgrade to at least 0.8.9, 0.9.6, or 1.0.1, depending on their current version branch, to apply the official fix. Beyond patching, organizations should audit sharing permissions and metadata exposure within Nextcloud to ensure no excessive or unintended sharing exists. Implement strict access control policies and monitor user activities related to table sharing metadata access. Employ network segmentation and restrict external access to Nextcloud instances to reduce exposure. Use multi-factor authentication and strong user authentication mechanisms to limit unauthorized access. Regularly review Nextcloud security advisories and subscribe to vendor notifications for timely updates. Consider deploying Web Application Firewalls (WAFs) with rules to detect anomalous requests targeting sharing metadata endpoints. Finally, conduct user awareness training to reduce the risk of social engineering that could leverage leaked sharing information.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-03T15:28:02.992Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693316b0f88dbe026cfdbe3e

Added to database: 12/5/2025, 5:30:24 PM

Last enriched: 12/12/2025, 7:14:54 PM

Last updated: 1/20/2026, 6:25:58 PM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats