Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66551: CWE-639: Authorization Bypass Through User-Controlled Key in nextcloud security-advisories

0
Medium
VulnerabilityCVE-2025-66551cvecve-2025-66551cwe-639
Published: Fri Dec 05 2025 (12/05/2025, 17:15:16 UTC)
Source: CVE Database V5
Vendor/Project: nextcloud
Product: security-advisories

Description

Nextcloud Tables allows you to create your own tables with individual columns. Prior to 0.8.6 and 0.9.3, a malicious user was able to create their own table and then move a column to a victims table. This vulnerability is fixed in 0.8.6 and 0.9.3.

AI-Powered Analysis

AILast updated: 12/12/2025, 18:59:07 UTC

Technical Analysis

CVE-2025-66551 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting Nextcloud Tables, a component that allows users to create custom tables with individual columns. In versions prior to 0.8.6 and 0.9.3, a malicious authenticated user could exploit this flaw by creating their own table and then moving a column into another user's table without proper authorization checks. This unauthorized column movement compromises data integrity by allowing attackers to manipulate or corrupt data belonging to other users. The vulnerability requires the attacker to have some level of privileges (PR:L) and user interaction (UI:R), but no elevated privileges beyond that. The CVSS v3.1 score is 6.3 (medium), reflecting network attack vector (AV:N), low attack complexity (AC:L), partial impact on integrity (I:H), and low impact on availability (A:L), with no confidentiality impact (C:N). The flaw was fixed in versions 0.8.6 and 0.9.3, but no patches are linked in the advisory. No known exploits have been reported in the wild as of the publication date (December 5, 2025). The vulnerability poses a risk primarily to data integrity and availability within collaborative environments using Nextcloud Tables, potentially allowing attackers to alter or disrupt data belonging to other users without proper authorization.

Potential Impact

For European organizations, this vulnerability threatens the integrity and availability of data managed within Nextcloud Tables, which is widely used for collaborative document and data management. Unauthorized column movement could lead to data corruption, loss of trust in data accuracy, and disruption of business processes relying on Nextcloud for data collaboration. Organizations handling sensitive or regulated data (e.g., financial, healthcare, or governmental data) may face compliance risks if data integrity is compromised. The vulnerability does not directly expose confidential data but could indirectly affect confidentiality if data corruption leads to improper data exposure or system instability. The ease of exploitation by authenticated users means insider threats or compromised accounts could leverage this flaw. Given Nextcloud's popularity in Europe, especially in Germany, France, and the Netherlands, the impact could be significant in sectors relying on secure data collaboration platforms.

Mitigation Recommendations

1. Upgrade Nextcloud Tables to version 0.8.6 or later, or 0.9.3 or later, as these versions contain the fix for this vulnerability. 2. Conduct an audit of user permissions and roles within Nextcloud to ensure that only trusted users have the ability to create tables or modify table structures. 3. Implement strict access controls and monitoring on Nextcloud instances to detect unusual table or column modifications. 4. Use logging and alerting mechanisms to track changes to tables and columns, enabling rapid detection of unauthorized activities. 5. Educate users about the risks of privilege misuse and enforce strong authentication mechanisms to reduce the risk of account compromise. 6. If upgrading is not immediately possible, consider restricting the ability to create or modify tables to a minimal set of trusted administrators. 7. Regularly review Nextcloud security advisories and apply patches promptly to mitigate emerging vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-04T15:57:22.034Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693316b0f88dbe026cfdbe44

Added to database: 12/5/2025, 5:30:24 PM

Last enriched: 12/12/2025, 6:59:07 PM

Last updated: 1/20/2026, 3:47:14 AM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats