Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66548: CWE-116: Improper Encoding or Escaping of Output in nextcloud security-advisories

0
Low
VulnerabilityCVE-2025-66548cvecve-2025-66548cwe-116
Published: Fri Dec 05 2025 (12/05/2025, 17:26:11 UTC)
Source: CVE Database V5
Vendor/Project: nextcloud
Product: security-advisories

Description

Nextcloud Deck is a kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. Prior to 1.12.7, 1.14.4, and 1.15.1, file extension can be spoofed by using RTLO characters, tricking users into download files with a different extension than what is displayed. This vulnerability is fixed in 1.12.7, 1.14.4, and 1.15.1.

AI-Powered Analysis

AILast updated: 12/12/2025, 19:07:38 UTC

Technical Analysis

CVE-2025-66548 is a vulnerability classified under CWE-116 (Improper Encoding or Escaping of Output) found in Nextcloud Deck, a kanban-style organizational tool integrated with the Nextcloud platform. The vulnerability arises from the improper handling of file names containing Right-to-Left Override (RTLO) Unicode characters. RTLO characters can reverse the display order of characters in file names, enabling an attacker to spoof the file extension shown to the user. For example, a malicious file named 'docx‮exe' could appear as 'exe.docx' in the user interface, misleading users about the true file type. This spoofing can facilitate social engineering attacks by tricking users into opening potentially harmful files they believe to be safe. The vulnerability affects Nextcloud Deck versions prior to 1.12.7, 1.14.4, and 1.15.1. Exploitation requires local access with low privileges and does not require user interaction, but the attacker must be able to upload or place files within the Nextcloud environment. The CVSS v3.1 base score is 3.3, indicating low severity, with the vector showing local attack vector, low complexity, low privileges required, no user interaction, and impact limited to integrity only. No known exploits have been reported in the wild. The vulnerability was publicly disclosed on December 5, 2025, and patches are available in the specified versions. The root cause is the failure to properly encode or escape output filenames containing RTLO characters, allowing the visual spoofing of file extensions in the Nextcloud Deck interface.

Potential Impact

For European organizations using Nextcloud Deck, this vulnerability primarily poses a risk of social engineering attacks through file extension spoofing. While it does not directly compromise confidentiality or availability, the misleading file names could cause users to open malicious files under false pretenses, potentially leading to malware execution or data integrity issues. Organizations relying heavily on Nextcloud for collaboration and file sharing may see increased risk if attackers exploit this flaw to distribute harmful payloads disguised as benign documents. The requirement for local access and low privileges limits remote exploitation, but insider threats or compromised accounts could leverage this vulnerability. The impact is thus mostly on data integrity and user trust, with indirect risks to confidentiality if malicious files are executed. Given the widespread use of Nextcloud in European public and private sectors, especially in countries with strong open-source adoption, the vulnerability could affect a significant number of users if unpatched.

Mitigation Recommendations

European organizations should immediately upgrade Nextcloud Deck to versions 1.12.7, 1.14.4, or 1.15.1 or later, where the vulnerability is fixed. Additionally, implement strict file upload validation and sanitization to detect and block filenames containing RTLO or other Unicode control characters that could be used for spoofing. Educate users about the risks of opening files with suspicious or unexpected extensions, especially those received through internal file sharing platforms. Employ endpoint security solutions capable of detecting and blocking execution of potentially malicious files regardless of extension. Monitor file uploads and user activity logs within Nextcloud for unusual behavior or attempts to upload files with obfuscated names. Consider disabling or restricting file uploads from untrusted users or external sources until patches are applied. Finally, maintain a robust patch management process to ensure timely updates of collaboration tools.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-04T15:52:26.550Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69331a32f88dbe026cff02b0

Added to database: 12/5/2025, 5:45:22 PM

Last enriched: 12/12/2025, 7:07:38 PM

Last updated: 2/7/2026, 4:46:33 AM

Views: 106

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats