Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66554: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nextcloud security-advisories

0
Low
VulnerabilityCVE-2025-66554cvecve-2025-66554cwe-79
Published: Fri Dec 05 2025 (12/05/2025, 17:50:59 UTC)
Source: CVE Database V5
Vendor/Project: nextcloud
Product: security-advisories

Description

Contacts app for Nextcloud easily syncs contacts from various devices with your Nextcloud and allows editing. Prior to 5.5.4, 6.0.6, and 7.2.5, a malicious user was able to modify their organisation and title field to load additional CSS files. Javascript and other options were correctly blocked by the content security policy of the Nextcloud Server code. This vulnerability is fixed in 5.5.4, 6.0.6, and 7.2.5.

AI-Powered Analysis

AILast updated: 12/12/2025, 19:08:26 UTC

Technical Analysis

CVE-2025-66554 is a cross-site scripting (CWE-79) vulnerability identified in the Contacts app component of Nextcloud, a widely used open-source file sharing and collaboration platform. The flaw exists in versions prior to 5.5.4, 6.0.6, and 7.2.5, where a malicious user with at least limited privileges can manipulate the 'organization' and 'title' fields of contact entries to inject additional CSS files into the web page generation process. This improper neutralization of input allows the attacker to influence the styling of the Nextcloud interface for other users viewing the compromised contact data. Despite this, the Nextcloud server enforces a strict content security policy (CSP) that blocks JavaScript and other potentially more dangerous payloads, mitigating the risk of script-based attacks such as full XSS. The vulnerability does not allow direct execution of arbitrary scripts or access to sensitive data, but it could be used for UI redressing or visual spoofing attacks that may facilitate phishing or social engineering. Exploitation requires the attacker to have at least some authenticated access and user interaction, limiting the attack surface. The vulnerability was publicly disclosed on December 5, 2025, with a CVSS v3.1 base score of 3.5 (low severity), reflecting its limited impact on confidentiality, integrity, and availability. No known exploits have been reported in the wild, and patches are available in the specified versions.

Potential Impact

For European organizations using Nextcloud, especially those leveraging the Contacts app for internal or external collaboration, this vulnerability poses a low but non-negligible risk. The ability to inject additional CSS could allow attackers to subtly alter the user interface, potentially misleading users or facilitating phishing attempts by changing visual elements such as buttons or links. While the impact on confidentiality and availability is minimal, the integrity of the user interface could be compromised, which may erode user trust and lead to indirect security consequences. Organizations with strict compliance requirements around data integrity and user authentication workflows should be aware of this risk. Since exploitation requires authenticated access and user interaction, insider threats or compromised accounts could be vectors. The limited scope and absence of JavaScript execution reduce the likelihood of widespread damage, but targeted attacks against high-value users or administrators remain a concern.

Mitigation Recommendations

European organizations should promptly upgrade affected Nextcloud Contacts app instances to versions 5.5.4, 6.0.6, or 7.2.5 or later to remediate this vulnerability. Additionally, organizations should review and enforce strict access controls and authentication policies to minimize the risk of unauthorized users gaining the privileges needed to exploit this issue. Implementing multi-factor authentication (MFA) can reduce the risk of account compromise. Monitoring logs for unusual modifications to contact fields may help detect exploitation attempts. Organizations should also verify that their Nextcloud instances have properly configured Content Security Policies to block unauthorized script execution. User awareness training about phishing and UI manipulation risks can further mitigate social engineering attacks that might leverage this vulnerability. Finally, regular vulnerability scanning and patch management processes should be maintained to ensure timely updates.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-04T15:57:22.035Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69331db5f88dbe026c00670f

Added to database: 12/5/2025, 6:00:21 PM

Last enriched: 12/12/2025, 7:08:26 PM

Last updated: 2/3/2026, 8:29:53 AM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats