CVE-2025-66553: CWE-639: Authorization Bypass Through User-Controlled Key in nextcloud security-advisories
Nextcloud Tables allows you to create your own tables with individual columns. Prior to 0.8.7 and 0.9.4, authenticated users were able to view meta data of columns in other tables of the Tables app by modifying the numeric ID in a request. This vulnerability is fixed in 0.8.7 and 0.9.4.
AI Analysis
Technical Summary
CVE-2025-66553 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting Nextcloud Tables, a component of the Nextcloud ecosystem that enables users to create customizable tables with individual columns. The vulnerability exists in versions prior to 0.8.7 and between 0.9.0-beta.1 and 0.9.4. Authenticated users can exploit this flaw by manipulating the numeric ID parameter in requests to access metadata of columns belonging to tables they do not own. This metadata exposure does not extend to the actual table data or allow modification, but it reveals structural information about other users' tables, which could be leveraged for further attacks or information gathering. The vulnerability requires authentication but no additional user interaction, and it can be exploited remotely over the network. The CVSS v3.1 base score is 4.3 (medium severity), reflecting low impact on confidentiality and no impact on integrity or availability, with low attack complexity and no user interaction required. The issue was publicly disclosed on December 5, 2025, and fixed in Nextcloud Tables versions 0.8.7 and 0.9.4. There are no known active exploits in the wild at this time.
Potential Impact
For European organizations, the primary impact of CVE-2025-66553 is the unauthorized disclosure of metadata related to Nextcloud Tables columns. While this does not directly compromise the confidentiality of actual data or affect system integrity or availability, the exposure of table schema information can facilitate more targeted attacks, such as social engineering, privilege escalation, or exploitation of other vulnerabilities. Organizations handling sensitive or regulated data may face compliance risks if metadata exposure leads to indirect data leakage or aids attackers in mapping internal data structures. Additionally, Nextcloud is widely used in Europe, especially among public sector entities, educational institutions, and enterprises valuing data sovereignty, increasing the likelihood of exposure. Although no active exploits are reported, the vulnerability's ease of exploitation by authenticated users means insider threats or compromised credentials could be leveraged to gain unauthorized insights. This could undermine trust in collaboration platforms and potentially lead to further security incidents if combined with other vulnerabilities or attack vectors.
Mitigation Recommendations
European organizations using Nextcloud Tables should immediately verify their deployed versions and upgrade to at least version 0.8.7 or 0.9.4 where this vulnerability is patched. Since the vulnerability requires authentication, organizations should enforce strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential compromise. Implement strict access controls and monitor user activities for anomalous behavior, especially requests involving manipulation of numeric IDs or unusual access patterns to table metadata. Network segmentation and limiting Nextcloud access to trusted networks or VPNs can reduce exposure. Additionally, conduct regular audits of Nextcloud app versions and configurations to ensure timely patching of security advisories. Educate users about the risks of credential sharing and insider threats. Finally, consider applying web application firewalls (WAF) rules to detect and block suspicious parameter tampering attempts targeting the Tables app endpoints.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy, Spain, Austria
CVE-2025-66553: CWE-639: Authorization Bypass Through User-Controlled Key in nextcloud security-advisories
Description
Nextcloud Tables allows you to create your own tables with individual columns. Prior to 0.8.7 and 0.9.4, authenticated users were able to view meta data of columns in other tables of the Tables app by modifying the numeric ID in a request. This vulnerability is fixed in 0.8.7 and 0.9.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-66553 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting Nextcloud Tables, a component of the Nextcloud ecosystem that enables users to create customizable tables with individual columns. The vulnerability exists in versions prior to 0.8.7 and between 0.9.0-beta.1 and 0.9.4. Authenticated users can exploit this flaw by manipulating the numeric ID parameter in requests to access metadata of columns belonging to tables they do not own. This metadata exposure does not extend to the actual table data or allow modification, but it reveals structural information about other users' tables, which could be leveraged for further attacks or information gathering. The vulnerability requires authentication but no additional user interaction, and it can be exploited remotely over the network. The CVSS v3.1 base score is 4.3 (medium severity), reflecting low impact on confidentiality and no impact on integrity or availability, with low attack complexity and no user interaction required. The issue was publicly disclosed on December 5, 2025, and fixed in Nextcloud Tables versions 0.8.7 and 0.9.4. There are no known active exploits in the wild at this time.
Potential Impact
For European organizations, the primary impact of CVE-2025-66553 is the unauthorized disclosure of metadata related to Nextcloud Tables columns. While this does not directly compromise the confidentiality of actual data or affect system integrity or availability, the exposure of table schema information can facilitate more targeted attacks, such as social engineering, privilege escalation, or exploitation of other vulnerabilities. Organizations handling sensitive or regulated data may face compliance risks if metadata exposure leads to indirect data leakage or aids attackers in mapping internal data structures. Additionally, Nextcloud is widely used in Europe, especially among public sector entities, educational institutions, and enterprises valuing data sovereignty, increasing the likelihood of exposure. Although no active exploits are reported, the vulnerability's ease of exploitation by authenticated users means insider threats or compromised credentials could be leveraged to gain unauthorized insights. This could undermine trust in collaboration platforms and potentially lead to further security incidents if combined with other vulnerabilities or attack vectors.
Mitigation Recommendations
European organizations using Nextcloud Tables should immediately verify their deployed versions and upgrade to at least version 0.8.7 or 0.9.4 where this vulnerability is patched. Since the vulnerability requires authentication, organizations should enforce strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential compromise. Implement strict access controls and monitor user activities for anomalous behavior, especially requests involving manipulation of numeric IDs or unusual access patterns to table metadata. Network segmentation and limiting Nextcloud access to trusted networks or VPNs can reduce exposure. Additionally, conduct regular audits of Nextcloud app versions and configurations to ensure timely patching of security advisories. Educate users about the risks of credential sharing and insider threats. Finally, consider applying web application firewalls (WAF) rules to detect and block suspicious parameter tampering attempts targeting the Tables app endpoints.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-04T15:57:22.034Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693316b0f88dbe026cfdbe4a
Added to database: 12/5/2025, 5:30:24 PM
Last enriched: 12/5/2025, 5:45:38 PM
Last updated: 12/6/2025, 4:25:36 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12510: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in trustindex Widgets for Google Reviews
HighCVE-2025-11263: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in linkwhspr Link Whisper Free
MediumCVE-2025-65955
UnknownCVE-2025-14116: Server-Side Request Forgery in xerrors Yuxi-Know
MediumCVE-2025-14111: Path Traversal in Rarlab RAR App
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.