CVE-2025-66551: CWE-639: Authorization Bypass Through User-Controlled Key in nextcloud security-advisories
Nextcloud Tables allows you to create your own tables with individual columns. Prior to 0.8.6 and 0.9.3, a malicious user was able to create their own table and then move a column to a victims table. This vulnerability is fixed in 0.8.6 and 0.9.3.
AI Analysis
Technical Summary
CVE-2025-66551 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting Nextcloud Tables, a component that allows users to create custom tables with individual columns. In versions prior to 0.8.6 and 0.9.3, a malicious authenticated user could exploit this flaw by creating their own table and then moving a column into another user's table without proper authorization checks. This unauthorized column movement compromises data integrity by allowing attackers to manipulate or corrupt data belonging to other users. The vulnerability requires the attacker to have some level of privileges (PR:L) and user interaction (UI:R), but no elevated privileges beyond that. The CVSS v3.1 score is 6.3 (medium), reflecting network attack vector (AV:N), low attack complexity (AC:L), partial impact on integrity (I:H), and low impact on availability (A:L), with no confidentiality impact (C:N). The flaw was fixed in versions 0.8.6 and 0.9.3, but no patches are linked in the advisory. No known exploits have been reported in the wild as of the publication date (December 5, 2025). The vulnerability poses a risk primarily to data integrity and availability within collaborative environments using Nextcloud Tables, potentially allowing attackers to alter or disrupt data belonging to other users without proper authorization.
Potential Impact
For European organizations, this vulnerability threatens the integrity and availability of data managed within Nextcloud Tables, which is widely used for collaborative document and data management. Unauthorized column movement could lead to data corruption, loss of trust in data accuracy, and disruption of business processes relying on Nextcloud for data collaboration. Organizations handling sensitive or regulated data (e.g., financial, healthcare, or governmental data) may face compliance risks if data integrity is compromised. The vulnerability does not directly expose confidential data but could indirectly affect confidentiality if data corruption leads to improper data exposure or system instability. The ease of exploitation by authenticated users means insider threats or compromised accounts could leverage this flaw. Given Nextcloud's popularity in Europe, especially in Germany, France, and the Netherlands, the impact could be significant in sectors relying on secure data collaboration platforms.
Mitigation Recommendations
1. Upgrade Nextcloud Tables to version 0.8.6 or later, or 0.9.3 or later, as these versions contain the fix for this vulnerability. 2. Conduct an audit of user permissions and roles within Nextcloud to ensure that only trusted users have the ability to create tables or modify table structures. 3. Implement strict access controls and monitoring on Nextcloud instances to detect unusual table or column modifications. 4. Use logging and alerting mechanisms to track changes to tables and columns, enabling rapid detection of unauthorized activities. 5. Educate users about the risks of privilege misuse and enforce strong authentication mechanisms to reduce the risk of account compromise. 6. If upgrading is not immediately possible, consider restricting the ability to create or modify tables to a minimal set of trusted administrators. 7. Regularly review Nextcloud security advisories and apply patches promptly to mitigate emerging vulnerabilities.
Affected Countries
Germany, France, Netherlands, United Kingdom, Sweden, Switzerland
CVE-2025-66551: CWE-639: Authorization Bypass Through User-Controlled Key in nextcloud security-advisories
Description
Nextcloud Tables allows you to create your own tables with individual columns. Prior to 0.8.6 and 0.9.3, a malicious user was able to create their own table and then move a column to a victims table. This vulnerability is fixed in 0.8.6 and 0.9.3.
AI-Powered Analysis
Technical Analysis
CVE-2025-66551 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting Nextcloud Tables, a component that allows users to create custom tables with individual columns. In versions prior to 0.8.6 and 0.9.3, a malicious authenticated user could exploit this flaw by creating their own table and then moving a column into another user's table without proper authorization checks. This unauthorized column movement compromises data integrity by allowing attackers to manipulate or corrupt data belonging to other users. The vulnerability requires the attacker to have some level of privileges (PR:L) and user interaction (UI:R), but no elevated privileges beyond that. The CVSS v3.1 score is 6.3 (medium), reflecting network attack vector (AV:N), low attack complexity (AC:L), partial impact on integrity (I:H), and low impact on availability (A:L), with no confidentiality impact (C:N). The flaw was fixed in versions 0.8.6 and 0.9.3, but no patches are linked in the advisory. No known exploits have been reported in the wild as of the publication date (December 5, 2025). The vulnerability poses a risk primarily to data integrity and availability within collaborative environments using Nextcloud Tables, potentially allowing attackers to alter or disrupt data belonging to other users without proper authorization.
Potential Impact
For European organizations, this vulnerability threatens the integrity and availability of data managed within Nextcloud Tables, which is widely used for collaborative document and data management. Unauthorized column movement could lead to data corruption, loss of trust in data accuracy, and disruption of business processes relying on Nextcloud for data collaboration. Organizations handling sensitive or regulated data (e.g., financial, healthcare, or governmental data) may face compliance risks if data integrity is compromised. The vulnerability does not directly expose confidential data but could indirectly affect confidentiality if data corruption leads to improper data exposure or system instability. The ease of exploitation by authenticated users means insider threats or compromised accounts could leverage this flaw. Given Nextcloud's popularity in Europe, especially in Germany, France, and the Netherlands, the impact could be significant in sectors relying on secure data collaboration platforms.
Mitigation Recommendations
1. Upgrade Nextcloud Tables to version 0.8.6 or later, or 0.9.3 or later, as these versions contain the fix for this vulnerability. 2. Conduct an audit of user permissions and roles within Nextcloud to ensure that only trusted users have the ability to create tables or modify table structures. 3. Implement strict access controls and monitoring on Nextcloud instances to detect unusual table or column modifications. 4. Use logging and alerting mechanisms to track changes to tables and columns, enabling rapid detection of unauthorized activities. 5. Educate users about the risks of privilege misuse and enforce strong authentication mechanisms to reduce the risk of account compromise. 6. If upgrading is not immediately possible, consider restricting the ability to create or modify tables to a minimal set of trusted administrators. 7. Regularly review Nextcloud security advisories and apply patches promptly to mitigate emerging vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-04T15:57:22.034Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693316b0f88dbe026cfdbe44
Added to database: 12/5/2025, 5:30:24 PM
Last enriched: 12/12/2025, 6:59:07 PM
Last updated: 1/20/2026, 3:47:14 AM
Views: 57
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1051: CWE-352 Cross-Site Request Forgery (CSRF) in satollo Newsletter – Send awesome emails from WordPress
MediumCVE-2025-14978: CWE-862 Missing Authorization in peachpay PeachPay — Payments & Express Checkout for WooCommerce (supports Stripe, PayPal, Square, Authorize.net)
MediumCVE-2026-23950: CWE-176: Improper Handling of Unicode Encoding in isaacs node-tar
HighCVE-2026-1203: Improper Authentication in CRMEB
MediumCVE-2026-1202: Improper Authentication in CRMEB
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.