CVE-2025-66513
BaseFortify
Publication date: 2025-12-05
Last updated on: 2025-12-09
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| nextcloud | tables | From 0.6.0 (inc) to 0.8.9 (exc) |
| nextcloud | tables | From 0.9.0 (inc) to 0.9.6 (exc) |
| nextcloud | tables | From 1.0.0 (inc) to 1.0.1 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-639 | The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Nextcloud Tables allowed unauthorized users to access information about which tables (identified by numeric IDs) were shared with which groups or users, along with the permissions granted. This information was accessible without proper privilege restrictions prior to versions 0.8.9, 0.9.6, and 1.0.1, potentially exposing sharing details to unauthorized parties.
How can this vulnerability impact me? :
The vulnerability could lead to unauthorized disclosure of sharing information, revealing which tables are shared with which users or groups and their permissions. This could allow attackers or unauthorized users to gain insights into data sharing configurations, potentially facilitating further attacks or privacy breaches.
What immediate steps should I take to mitigate this vulnerability?
Update Nextcloud Tables to version 0.8.9, 0.9.6, or 1.0.1 or later, as these versions contain the fix for this vulnerability.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows unauthorized users to access information about which tables are shared with which groups or users and their permissions, leading to a low confidentiality loss. Such unauthorized disclosure of sharing information could potentially impact compliance with data protection regulations like GDPR or HIPAA, which require strict control over access to personal or sensitive data. By exposing sharing details without proper authorization, the vulnerability may increase the risk of non-compliance with these standards. The fix enforces stricter permission checks and hides resource existence from unauthorized users, thereby improving compliance posture. [3, 1]