Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66554: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nextcloud security-advisories

0
Low
VulnerabilityCVE-2025-66554cvecve-2025-66554cwe-79
Published: Fri Dec 05 2025 (12/05/2025, 17:50:59 UTC)
Source: CVE Database V5
Vendor/Project: nextcloud
Product: security-advisories

Description

Contacts app for Nextcloud easily syncs contacts from various devices with your Nextcloud and allows editing. Prior to 5.5.4, 6.0.6, and 7.2.5, a malicious user was able to modify their organisation and title field to load additional CSS files. Javascript and other options were correctly blocked by the content security policy of the Nextcloud Server code. This vulnerability is fixed in 5.5.4, 6.0.6, and 7.2.5.

AI-Powered Analysis

AILast updated: 12/05/2025, 18:15:47 UTC

Technical Analysis

CVE-2025-66554 is a cross-site scripting vulnerability classified under CWE-79 found in the Nextcloud Contacts app, which synchronizes contacts across devices. The vulnerability exists in versions prior to 5.5.4, 6.0.6, and 7.2.5, where a malicious user with at least limited privileges can manipulate the organisation and title fields to inject additional CSS files into the web page generation process. Although JavaScript and other potentially dangerous content are blocked by Nextcloud's content security policy, the ability to load arbitrary CSS can still alter the visual presentation of the application, potentially misleading users or facilitating UI redressing attacks. The vulnerability requires user interaction and some level of privilege (PR:L) but does not allow direct code execution or data exfiltration. The CVSS 3.1 score is 3.5 (low), reflecting the limited impact on confidentiality and availability, with integrity affected only in terms of UI appearance. No public exploits have been reported, and the issue was publicly disclosed on December 5, 2025. The fix is included in Nextcloud Contacts app versions 5.5.4, 6.0.6, and 7.2.5.

Potential Impact

For European organizations, the primary impact of this vulnerability is the potential alteration of the user interface within the Nextcloud Contacts app, which could be used to mislead users or conduct social engineering attacks. While it does not directly compromise sensitive data or system availability, the integrity of the user experience is at risk. Organizations relying heavily on Nextcloud for contact management, especially in sectors like government, education, and enterprises with strict compliance requirements, may face reputational risks if attackers exploit this flaw to create confusion or phishing scenarios. The requirement for user interaction and limited privileges reduces the likelihood of widespread exploitation but does not eliminate targeted attacks. Since Nextcloud is widely used in Europe, especially in countries promoting open-source solutions, the vulnerability could affect a significant number of users if unpatched.

Mitigation Recommendations

The most effective mitigation is to upgrade the Nextcloud Contacts app to versions 5.5.4, 6.0.6, or 7.2.5 or later, where the vulnerability is fixed. Organizations should audit their Nextcloud deployments to identify affected versions and prioritize patching. Additionally, administrators should review and tighten user input validation and sanitization policies, particularly for fields that can influence UI rendering. Implementing strict Content Security Policies (CSP) beyond the default Nextcloud settings can further reduce risk by restricting the loading of external CSS resources. Monitoring user activity logs for unusual modifications to contact fields and educating users about potential UI manipulation tactics can help detect and prevent exploitation. For custom Nextcloud instances or integrations, code reviews focusing on input handling in the Contacts app are recommended.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-04T15:57:22.035Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69331db5f88dbe026c00670f

Added to database: 12/5/2025, 6:00:21 PM

Last enriched: 12/5/2025, 6:15:47 PM

Last updated: 12/10/2025, 11:19:38 PM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats