CVE-2025-66510

4.5 MEDIUM

📋 TL;DR

This vulnerability in Nextcloud Server allows authenticated users to retrieve personal data (emails, names, identifiers) of other users through the contacts search feature without proper access controls. It affects Nextcloud Server and Nextcloud Enterprise Server across multiple versions, enabling information disclosure of unrelated user accounts.

💻 Affected Systems

Products:
  • Nextcloud Server
  • Nextcloud Enterprise Server
Versions: Nextcloud Server prior to 31.0.10 and 32.0.1; Nextcloud Enterprise Server prior to 28.0.14.11, 29.0.16.8, 30.0.17.3, and 31.0.10
Operating Systems: All platforms running affected Nextcloud versions
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all configurations where contacts app is enabled (default). Requires authenticated user access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated malicious insider could systematically harvest personal information of all users in the system, potentially enabling social engineering, targeted phishing, or identity theft attacks.

🟠

Likely Case

Authenticated users inadvertently or intentionally accessing contact information of users they shouldn't have access to, violating privacy expectations and potentially exposing sensitive personal data.

🟢

If Mitigated

Limited to authenticated users only, with no ability to modify or delete data, and exposure limited to contact information rather than passwords or system files.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to Nextcloud. The vulnerability is in the contacts search functionality and can be triggered through normal API calls.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Nextcloud Server 31.0.10, 32.0.1; Nextcloud Enterprise Server 28.0.14.11, 29.0.16.8, 30.0.17.3, 31.0.10

Vendor Advisory: https://github.com/nextcloud/security-advisories/security/advisories/GHSA-495w-cqv6-wr59

Restart Required: No

Instructions:

1. Backup your Nextcloud installation and database. 2. Update to the patched version using your preferred method (web updater, occ command, or manual download). 3. Run occ upgrade if using command line. 4. Verify the update completed successfully.

🔧 Temporary Workarounds

Disable Contacts App

linux

Temporarily disable the contacts application to prevent exploitation of the vulnerability

sudo -u www-data php occ app:disable contacts

🧯 If You Can't Patch

  • Restrict user access to only trusted individuals and monitor for unusual contacts search activity
  • Implement network segmentation to isolate Nextcloud instance and limit potential data exfiltration

🔍 How to Verify

Check if Vulnerable:

Check your Nextcloud version via the admin interface or run: sudo -u www-data php occ status

Check Version:

sudo -u www-data php occ status | grep 'versionstring'

Verify Fix Applied:

Verify version is patched (31.0.10+, 32.0.1+ for Server; 28.0.14.11+, 29.0.16.8+, 30.0.17.3+, 31.0.10+ for Enterprise) and test contacts search functionality with test accounts

📡 Detection & Monitoring

Log Indicators:

  • Unusual volume of contacts API calls from single users
  • Contacts search queries returning many results from unrelated users

Network Indicators:

  • High volume of requests to /index.php/apps/contacts/api/v1/contacts endpoint
  • Patterns of systematic contacts data retrieval

SIEM Query:

source="nextcloud.log" AND "apps/contacts/api" AND status=200 | stats count by src_user

🔗 References

📤 Share & Export