CVE-2025-66556: CWE-639: Authorization Bypass Through User-Controlled Key in nextcloud security-advisories
Nextcloud talk is a video & audio conferencing app for Nextcloud. Prior to 20.1.8 and 21.1.2, a participant with chat permissions was able to delete poll drafts of other participants within the conversation based on their numeric ID. This vulnerability is fixed in 20.1.8 and 21.1.2.
AI Analysis
Technical Summary
CVE-2025-66556 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting Nextcloud Talk, a video and audio conferencing application integrated into the Nextcloud platform. The flaw exists in versions prior to 20.1.8 and 21.1.2, where a participant with chat permissions can delete poll drafts created by other participants within the same conversation. This is possible because the application improperly authorizes actions based on a numeric poll draft ID that can be manipulated by the user, allowing unauthorized deletion of other users' poll drafts. The vulnerability does not expose confidential information nor does it impact system availability but compromises data integrity by allowing unauthorized modification of conversation content. Exploitation requires the attacker to have at least chat permissions and to interact with the application to specify the target poll draft ID. The issue was addressed in Nextcloud Talk versions 20.1.8 and 21.1.2 by enforcing proper authorization checks on poll draft deletion requests. The CVSS v3.1 base score is 3.5, reflecting low severity due to limited impact and required privileges. No known active exploits have been reported, indicating a low immediate threat but a potential risk if unpatched.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential unauthorized modification of collaborative content within Nextcloud Talk conversations. This could undermine trust in meeting artifacts, disrupt decision-making processes, or cause confusion if poll drafts are deleted without authorization. While the confidentiality and availability of communications remain unaffected, the integrity of collaborative data is compromised. Organizations relying heavily on Nextcloud Talk for internal communications and decision-making may face operational inefficiencies or reputational damage if such unauthorized actions occur. Given the low CVSS score and the need for chat permissions, the risk is moderate but should not be ignored, especially in regulated sectors where data integrity is critical. The absence of known exploits reduces immediate risk but patching is essential to prevent future exploitation.
Mitigation Recommendations
European organizations should immediately upgrade Nextcloud Talk to versions 20.1.8 or 21.1.2 or later to remediate this vulnerability. Administrators should audit user permissions to ensure that only trusted users have chat permissions, minimizing the risk of insider misuse. Implement monitoring and logging of poll draft deletion activities to detect unusual or unauthorized actions. Consider restricting poll draft deletion capabilities to higher privilege roles if feasible. Regularly review and update Nextcloud and its apps to the latest stable releases to benefit from security patches. Additionally, educate users about the importance of reporting unexpected changes in collaborative content. Employ network segmentation and access controls to limit exposure of Nextcloud services to only necessary users and networks. Finally, maintain an incident response plan to address any detected misuse promptly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-66556: CWE-639: Authorization Bypass Through User-Controlled Key in nextcloud security-advisories
Description
Nextcloud talk is a video & audio conferencing app for Nextcloud. Prior to 20.1.8 and 21.1.2, a participant with chat permissions was able to delete poll drafts of other participants within the conversation based on their numeric ID. This vulnerability is fixed in 20.1.8 and 21.1.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-66556 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting Nextcloud Talk, a video and audio conferencing application integrated into the Nextcloud platform. The flaw exists in versions prior to 20.1.8 and 21.1.2, where a participant with chat permissions can delete poll drafts created by other participants within the same conversation. This is possible because the application improperly authorizes actions based on a numeric poll draft ID that can be manipulated by the user, allowing unauthorized deletion of other users' poll drafts. The vulnerability does not expose confidential information nor does it impact system availability but compromises data integrity by allowing unauthorized modification of conversation content. Exploitation requires the attacker to have at least chat permissions and to interact with the application to specify the target poll draft ID. The issue was addressed in Nextcloud Talk versions 20.1.8 and 21.1.2 by enforcing proper authorization checks on poll draft deletion requests. The CVSS v3.1 base score is 3.5, reflecting low severity due to limited impact and required privileges. No known active exploits have been reported, indicating a low immediate threat but a potential risk if unpatched.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential unauthorized modification of collaborative content within Nextcloud Talk conversations. This could undermine trust in meeting artifacts, disrupt decision-making processes, or cause confusion if poll drafts are deleted without authorization. While the confidentiality and availability of communications remain unaffected, the integrity of collaborative data is compromised. Organizations relying heavily on Nextcloud Talk for internal communications and decision-making may face operational inefficiencies or reputational damage if such unauthorized actions occur. Given the low CVSS score and the need for chat permissions, the risk is moderate but should not be ignored, especially in regulated sectors where data integrity is critical. The absence of known exploits reduces immediate risk but patching is essential to prevent future exploitation.
Mitigation Recommendations
European organizations should immediately upgrade Nextcloud Talk to versions 20.1.8 or 21.1.2 or later to remediate this vulnerability. Administrators should audit user permissions to ensure that only trusted users have chat permissions, minimizing the risk of insider misuse. Implement monitoring and logging of poll draft deletion activities to detect unusual or unauthorized actions. Consider restricting poll draft deletion capabilities to higher privilege roles if feasible. Regularly review and update Nextcloud and its apps to the latest stable releases to benefit from security patches. Additionally, educate users about the importance of reporting unexpected changes in collaborative content. Employ network segmentation and access controls to limit exposure of Nextcloud services to only necessary users and networks. Finally, maintain an incident response plan to address any detected misuse promptly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-04T16:01:32.472Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69332135f88dbe026c01495c
Added to database: 12/5/2025, 6:15:17 PM
Last enriched: 12/5/2025, 6:30:45 PM
Last updated: 12/7/2025, 11:46:13 PM
Views: 23
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14205: Cross Site Scripting in code-projects Chamber of Commerce Membership Management System
MediumCVE-2025-14204: OS Command Injection in TykoDev cherry-studio-TykoFork
MediumCVE-2025-14203: SQL Injection in code-projects Question Paper Generator
MediumCVE-2025-14201: Cross Site Scripting in alokjaiswal Hotel-Management-services-using-MYSQL-and-php
MediumCVE-2025-14200: Cross Site Scripting in alokjaiswal Hotel-Management-services-using-MYSQL-and-php
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.