CVE-2025-64011
📋 TL;DR
Nextcloud Server 30.0.0 contains an Insecure Direct Object Reference (IDOR) vulnerability in the /core/preview endpoint. Authenticated users can access previews of other users' files by manipulating the fileId parameter, leading to unauthorized data disclosure. This affects all Nextcloud Server 30.0.0 installations with authenticated user access.
💻 Affected Systems
- Nextcloud Server
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Mass data exfiltration where an attacker systematically accesses sensitive files (financial documents, personal data, confidential business information) from all users, potentially leading to regulatory violations and significant reputational damage.
Likely Case
Targeted access to specific users' files containing sensitive information like personal documents, images, or business data, violating privacy expectations and potentially exposing confidential information.
If Mitigated
Limited exposure of non-sensitive files or detection through monitoring before significant data loss occurs.
🎯 Exploit Status
Exploitation requires authenticated access but is trivial via parameter manipulation; public proof-of-concept exists in GitHub gists.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 30.0.1 or later
Vendor Advisory: https://nextcloud.com
Restart Required: No
Instructions:
1. Backup your Nextcloud installation and database. 2. Update Nextcloud Server to version 30.0.1 or later via the web updater or manual installation. 3. Verify the update completed successfully.
🔧 Temporary Workarounds
Disable preview endpoint
allTemporarily disable the vulnerable /core/preview endpoint via web server configuration
# For Apache: add to .htaccess
RewriteRule ^core/preview - [F]
# For Nginx: add to server block
location ~ ^/core/preview { return 403; }
Restrict preview access
allImplement IP-based restrictions or additional authentication for preview endpoints
# Example Apache restriction
<Location /core/preview>
Require ip 192.168.1.0/24
</Location>
🧯 If You Can't Patch
- Implement strict access controls and monitoring on the /core/preview endpoint
- Enable detailed logging and alerting for unauthorized file access attempts
🔍 How to Verify
Check if Vulnerable:
Check Nextcloud version via admin panel or run: php occ status | grep version
Check Version:
php occ status | grep version
Verify Fix Applied:
Confirm version is 30.0.1 or later and test that authenticated users cannot access other users' files via /core/preview endpoint
📡 Detection & Monitoring
Log Indicators:
- Multiple failed or successful requests to /core/preview with different fileId parameters from same user
- Access patterns showing user accessing files outside their normal scope
Network Indicators:
- Unusual volume of requests to preview endpoint
- Requests with sequential or manipulated fileId parameters
SIEM Query:
source="nextcloud.log" AND (url_path="/core/preview" AND fileId NOT IN user_owned_files)