CVE-2025-66513: CWE-639: Authorization Bypass Through User-Controlled Key in nextcloud security-advisories
CVE-2025-66513 is a medium severity authorization bypass vulnerability in Nextcloud Tables versions prior to 0. 8. 9, 0. 9. 6, and 1. 0. 1. It allows unauthorized users to access information about which tables are shared with which groups or users and their permissions, due to insufficient access control on user-controlled keys. Exploitation requires network access and some user interaction but no privileges. The vulnerability impacts confidentiality but not integrity or availability.
AI Analysis
Technical Summary
CVE-2025-66513 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting Nextcloud Tables, a component that allows users to create custom tables with individual columns. The flaw exists in versions prior to 0.8.9, 0.9.6, and 1.0.1, where the mechanism controlling access to metadata about table sharing—specifically which numeric table IDs are shared with which groups or users and their associated permissions—was insufficiently restricted. This means that non-privileged users could query or infer sharing information that should have been limited to privileged users only. The vulnerability arises because the key controlling access is user-controlled and not properly validated or authorized by the system, allowing unauthorized disclosure of sharing configurations. The CVSS 3.1 score is 4.3 (medium), reflecting that the attack vector is network-based, requires no privileges but does require user interaction, and impacts confidentiality only, without affecting integrity or availability. The vulnerability does not require authentication but does require user interaction, such as accessing a crafted link or interface. No known exploits have been reported in the wild as of the publication date. The issue was addressed by Nextcloud in versions 0.8.9, 0.9.6, and 1.0.1 by enforcing proper access control checks on the sharing metadata keys, ensuring only authorized users can retrieve sharing information. This vulnerability could allow attackers to gather sensitive information about data sharing relationships within an organization, potentially aiding further targeted attacks or social engineering.
Potential Impact
For European organizations, this vulnerability primarily threatens confidentiality by exposing sensitive metadata about data sharing within Nextcloud Tables. Attackers could identify which tables are shared with which users or groups, revealing organizational structure, collaboration patterns, or sensitive project information. This could facilitate targeted phishing, social engineering, or reconnaissance for more severe attacks. Although the vulnerability does not directly compromise data integrity or availability, the leakage of sharing information can undermine trust and compliance with data protection regulations such as GDPR, especially if the shared data is sensitive or regulated. Organizations relying on Nextcloud for internal collaboration and document management are at risk of unauthorized disclosure of sharing relationships, which could have reputational and operational consequences. The medium severity rating indicates moderate risk, but the ease of exploitation without privileges means organizations should prioritize patching. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.
Mitigation Recommendations
European organizations using Nextcloud Tables should immediately verify their version and upgrade to at least 0.8.9, 0.9.6, or 1.0.1, depending on their current version branch, to apply the official fix. Beyond patching, organizations should audit sharing permissions and metadata exposure within Nextcloud to ensure no excessive or unintended sharing exists. Implement strict access control policies and monitor user activities related to table sharing metadata access. Employ network segmentation and restrict external access to Nextcloud instances to reduce exposure. Use multi-factor authentication and strong user authentication mechanisms to limit unauthorized access. Regularly review Nextcloud security advisories and subscribe to vendor notifications for timely updates. Consider deploying Web Application Firewalls (WAFs) with rules to detect anomalous requests targeting sharing metadata endpoints. Finally, conduct user awareness training to reduce the risk of social engineering that could leverage leaked sharing information.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy, Spain
CVE-2025-66513: CWE-639: Authorization Bypass Through User-Controlled Key in nextcloud security-advisories
Description
CVE-2025-66513 is a medium severity authorization bypass vulnerability in Nextcloud Tables versions prior to 0. 8. 9, 0. 9. 6, and 1. 0. 1. It allows unauthorized users to access information about which tables are shared with which groups or users and their permissions, due to insufficient access control on user-controlled keys. Exploitation requires network access and some user interaction but no privileges. The vulnerability impacts confidentiality but not integrity or availability.
AI-Powered Analysis
Technical Analysis
CVE-2025-66513 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting Nextcloud Tables, a component that allows users to create custom tables with individual columns. The flaw exists in versions prior to 0.8.9, 0.9.6, and 1.0.1, where the mechanism controlling access to metadata about table sharing—specifically which numeric table IDs are shared with which groups or users and their associated permissions—was insufficiently restricted. This means that non-privileged users could query or infer sharing information that should have been limited to privileged users only. The vulnerability arises because the key controlling access is user-controlled and not properly validated or authorized by the system, allowing unauthorized disclosure of sharing configurations. The CVSS 3.1 score is 4.3 (medium), reflecting that the attack vector is network-based, requires no privileges but does require user interaction, and impacts confidentiality only, without affecting integrity or availability. The vulnerability does not require authentication but does require user interaction, such as accessing a crafted link or interface. No known exploits have been reported in the wild as of the publication date. The issue was addressed by Nextcloud in versions 0.8.9, 0.9.6, and 1.0.1 by enforcing proper access control checks on the sharing metadata keys, ensuring only authorized users can retrieve sharing information. This vulnerability could allow attackers to gather sensitive information about data sharing relationships within an organization, potentially aiding further targeted attacks or social engineering.
Potential Impact
For European organizations, this vulnerability primarily threatens confidentiality by exposing sensitive metadata about data sharing within Nextcloud Tables. Attackers could identify which tables are shared with which users or groups, revealing organizational structure, collaboration patterns, or sensitive project information. This could facilitate targeted phishing, social engineering, or reconnaissance for more severe attacks. Although the vulnerability does not directly compromise data integrity or availability, the leakage of sharing information can undermine trust and compliance with data protection regulations such as GDPR, especially if the shared data is sensitive or regulated. Organizations relying on Nextcloud for internal collaboration and document management are at risk of unauthorized disclosure of sharing relationships, which could have reputational and operational consequences. The medium severity rating indicates moderate risk, but the ease of exploitation without privileges means organizations should prioritize patching. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.
Mitigation Recommendations
European organizations using Nextcloud Tables should immediately verify their version and upgrade to at least 0.8.9, 0.9.6, or 1.0.1, depending on their current version branch, to apply the official fix. Beyond patching, organizations should audit sharing permissions and metadata exposure within Nextcloud to ensure no excessive or unintended sharing exists. Implement strict access control policies and monitor user activities related to table sharing metadata access. Employ network segmentation and restrict external access to Nextcloud instances to reduce exposure. Use multi-factor authentication and strong user authentication mechanisms to limit unauthorized access. Regularly review Nextcloud security advisories and subscribe to vendor notifications for timely updates. Consider deploying Web Application Firewalls (WAFs) with rules to detect anomalous requests targeting sharing metadata endpoints. Finally, conduct user awareness training to reduce the risk of social engineering that could leverage leaked sharing information.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-03T15:28:02.992Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693316b0f88dbe026cfdbe3e
Added to database: 12/5/2025, 5:30:24 PM
Last enriched: 12/12/2025, 7:14:54 PM
Last updated: 1/20/2026, 6:25:58 PM
Views: 64
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67263: n/a
HighCVE-2025-33231: CWE-427 Uncontrolled Search Path Element in NVIDIA CUDA Toolkit
MediumCVE-2025-33230: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in NVIDIA CUDA Toolkit
HighCVE-2025-67261: n/a
HighCVE-2025-55423: n/a
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.