CVE-2025-66554: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nextcloud security-advisories
Contacts app for Nextcloud easily syncs contacts from various devices with your Nextcloud and allows editing. Prior to 5.5.4, 6.0.6, and 7.2.5, a malicious user was able to modify their organisation and title field to load additional CSS files. Javascript and other options were correctly blocked by the content security policy of the Nextcloud Server code. This vulnerability is fixed in 5.5.4, 6.0.6, and 7.2.5.
AI Analysis
Technical Summary
CVE-2025-66554 is a cross-site scripting vulnerability classified under CWE-79 found in the Nextcloud Contacts app, which synchronizes contacts across devices. The vulnerability exists in versions prior to 5.5.4, 6.0.6, and 7.2.5, where a malicious user with at least limited privileges can manipulate the organisation and title fields to inject additional CSS files into the web page generation process. Although JavaScript and other potentially dangerous content are blocked by Nextcloud's content security policy, the ability to load arbitrary CSS can still alter the visual presentation of the application, potentially misleading users or facilitating UI redressing attacks. The vulnerability requires user interaction and some level of privilege (PR:L) but does not allow direct code execution or data exfiltration. The CVSS 3.1 score is 3.5 (low), reflecting the limited impact on confidentiality and availability, with integrity affected only in terms of UI appearance. No public exploits have been reported, and the issue was publicly disclosed on December 5, 2025. The fix is included in Nextcloud Contacts app versions 5.5.4, 6.0.6, and 7.2.5.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential alteration of the user interface within the Nextcloud Contacts app, which could be used to mislead users or conduct social engineering attacks. While it does not directly compromise sensitive data or system availability, the integrity of the user experience is at risk. Organizations relying heavily on Nextcloud for contact management, especially in sectors like government, education, and enterprises with strict compliance requirements, may face reputational risks if attackers exploit this flaw to create confusion or phishing scenarios. The requirement for user interaction and limited privileges reduces the likelihood of widespread exploitation but does not eliminate targeted attacks. Since Nextcloud is widely used in Europe, especially in countries promoting open-source solutions, the vulnerability could affect a significant number of users if unpatched.
Mitigation Recommendations
The most effective mitigation is to upgrade the Nextcloud Contacts app to versions 5.5.4, 6.0.6, or 7.2.5 or later, where the vulnerability is fixed. Organizations should audit their Nextcloud deployments to identify affected versions and prioritize patching. Additionally, administrators should review and tighten user input validation and sanitization policies, particularly for fields that can influence UI rendering. Implementing strict Content Security Policies (CSP) beyond the default Nextcloud settings can further reduce risk by restricting the loading of external CSS resources. Monitoring user activity logs for unusual modifications to contact fields and educating users about potential UI manipulation tactics can help detect and prevent exploitation. For custom Nextcloud instances or integrations, code reviews focusing on input handling in the Contacts app are recommended.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Austria, Belgium
CVE-2025-66554: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nextcloud security-advisories
Description
Contacts app for Nextcloud easily syncs contacts from various devices with your Nextcloud and allows editing. Prior to 5.5.4, 6.0.6, and 7.2.5, a malicious user was able to modify their organisation and title field to load additional CSS files. Javascript and other options were correctly blocked by the content security policy of the Nextcloud Server code. This vulnerability is fixed in 5.5.4, 6.0.6, and 7.2.5.
AI-Powered Analysis
Technical Analysis
CVE-2025-66554 is a cross-site scripting vulnerability classified under CWE-79 found in the Nextcloud Contacts app, which synchronizes contacts across devices. The vulnerability exists in versions prior to 5.5.4, 6.0.6, and 7.2.5, where a malicious user with at least limited privileges can manipulate the organisation and title fields to inject additional CSS files into the web page generation process. Although JavaScript and other potentially dangerous content are blocked by Nextcloud's content security policy, the ability to load arbitrary CSS can still alter the visual presentation of the application, potentially misleading users or facilitating UI redressing attacks. The vulnerability requires user interaction and some level of privilege (PR:L) but does not allow direct code execution or data exfiltration. The CVSS 3.1 score is 3.5 (low), reflecting the limited impact on confidentiality and availability, with integrity affected only in terms of UI appearance. No public exploits have been reported, and the issue was publicly disclosed on December 5, 2025. The fix is included in Nextcloud Contacts app versions 5.5.4, 6.0.6, and 7.2.5.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential alteration of the user interface within the Nextcloud Contacts app, which could be used to mislead users or conduct social engineering attacks. While it does not directly compromise sensitive data or system availability, the integrity of the user experience is at risk. Organizations relying heavily on Nextcloud for contact management, especially in sectors like government, education, and enterprises with strict compliance requirements, may face reputational risks if attackers exploit this flaw to create confusion or phishing scenarios. The requirement for user interaction and limited privileges reduces the likelihood of widespread exploitation but does not eliminate targeted attacks. Since Nextcloud is widely used in Europe, especially in countries promoting open-source solutions, the vulnerability could affect a significant number of users if unpatched.
Mitigation Recommendations
The most effective mitigation is to upgrade the Nextcloud Contacts app to versions 5.5.4, 6.0.6, or 7.2.5 or later, where the vulnerability is fixed. Organizations should audit their Nextcloud deployments to identify affected versions and prioritize patching. Additionally, administrators should review and tighten user input validation and sanitization policies, particularly for fields that can influence UI rendering. Implementing strict Content Security Policies (CSP) beyond the default Nextcloud settings can further reduce risk by restricting the loading of external CSS resources. Monitoring user activity logs for unusual modifications to contact fields and educating users about potential UI manipulation tactics can help detect and prevent exploitation. For custom Nextcloud instances or integrations, code reviews focusing on input handling in the Contacts app are recommended.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-04T15:57:22.035Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69331db5f88dbe026c00670f
Added to database: 12/5/2025, 6:00:21 PM
Last enriched: 12/5/2025, 6:15:47 PM
Last updated: 12/10/2025, 11:19:38 PM
Views: 41
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67509: CWE-94: Improper Control of Generation of Code ('Code Injection') in neuron-core neuron-ai
HighCVE-2025-67510: CWE-250: Execution with Unnecessary Privileges in neuron-core neuron-ai
CriticalCVE-2025-67513: CWE-521: Weak Password Requirements in FreePBX security-reporting
MediumCVE-2025-67505: CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in okta okta-sdk-java
HighCVE-2025-67490: CWE-863: Incorrect Authorization in auth0 nextjs-auth0
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.