CVE-2025-64766

5.3 MEDIUM

📋 TL;DR

CVE-2025-64766 is a hard-coded secret vulnerability in NixOS's OnlyOffice document server module that allows attackers with knowledge of a document revision ID to access cached files. This primarily affects users of NixOS versions 22.11 through 25.05 and unstable versions before 25.11. The impact is limited to accessing known documents from users with expired access.

💻 Affected Systems

Products:
  • NixOS OnlyOffice document server module
Versions: NixOS versions 22.11 to 25.05, and unstable versions before 25.11
Operating Systems: NixOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects NixOS installations using the OnlyOffice document server module.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive documents if they obtain valid revision IDs, potentially exposing confidential information.

🟠

Likely Case

Limited access to documents with known revision IDs, primarily affecting documents from users whose access has expired.

🟢

If Mitigated

Minimal impact if revision IDs are properly protected and access controls are enforced.

🌐 Internet-Facing: MEDIUM - Internet-facing instances could be targeted if revision IDs are discovered through other means.
🏢 Internal Only: LOW - Requires internal access and knowledge of specific revision IDs.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires knowledge of specific document revision IDs, which should be difficult to obtain in practice.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: NixOS unstable 25.11 and version 25.05

Vendor Advisory: https://github.com/NixOS/nixpkgs/security/advisories/GHSA-58m4-5wg3-5g5v

Restart Required: Yes

Instructions:

1. Update NixOS to version 25.05 or unstable 25.11. 2. Rebuild the system with 'nixos-rebuild switch'. 3. Restart the OnlyOffice document server service.

🔧 Temporary Workarounds

Disable OnlyOffice document server

linux

Temporarily disable the vulnerable service until patching is possible.

sudo systemctl stop onlyoffice-documentserver
sudo systemctl disable onlyoffice-documentserver

🧯 If You Can't Patch

  • Restrict network access to OnlyOffice document server to trusted networks only.
  • Implement additional access controls and monitoring for document revision ID usage.

🔍 How to Verify

Check if Vulnerable:

Check NixOS version with 'nixos-version' and verify if OnlyOffice document server is installed and running.

Check Version:

nixos-version

Verify Fix Applied:

Confirm NixOS version is 25.05 or unstable 25.11, and verify the OnlyOffice service is running with updated configuration.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to document cache files
  • Requests with invalid or unexpected revision IDs

Network Indicators:

  • Suspicious requests to document cache endpoints

SIEM Query:

source="onlyoffice" AND (revision_id_access OR cache_access)

🔗 References

📤 Share & Export