CVE-2025-66515

2.7 LOW

📋 TL;DR

This vulnerability in Nextcloud Approval app allows authenticated users listed as requesters in workflows to mark other users' files as 'pending approval' without having access to those files, using only the numeric file ID. This affects Nextcloud instances using Approval app versions before 1.3.1 or 2.5.0 where workflow features are enabled.

💻 Affected Systems

Products:
  • Nextcloud Approval app
Versions: All versions before 1.3.1 and 2.5.0
Operating Systems: All platforms running Nextcloud
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the Approval app to be installed and workflow features configured with users assigned as requesters.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could disrupt business workflows by marking critical files as pending approval, potentially delaying important processes or creating confusion about file status.

🟠

Likely Case

Limited workflow disruption where users find their files unexpectedly marked for approval, requiring manual intervention to correct.

🟢

If Mitigated

Minimal impact with proper access controls and monitoring, as the vulnerability doesn't allow file access or modification.

🌐 Internet-Facing: MEDIUM - Internet-facing Nextcloud instances are vulnerable if exposed to authenticated attackers, but exploitation requires specific workflow configurations.
🏢 Internal Only: MEDIUM - Internal users with requester roles could abuse this to disrupt workflows, though impact is limited to approval status changes.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and knowledge of file IDs, but the technique is straightforward once those conditions are met.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.1 or 2.5.0

Vendor Advisory: https://github.com/nextcloud/security-advisories/security/advisories/GHSA-q26g-fmjq-x5g5

Restart Required: No

Instructions:

1. Update Nextcloud Approval app to version 1.3.1 or 2.5.0 via Nextcloud app store or manual installation. 2. Verify the update completed successfully. 3. No server restart required.

🔧 Temporary Workarounds

Disable Approval app

linux

Temporarily disable the Approval app if immediate patching isn't possible

occ app:disable approval

Restrict requester roles

all

Review and limit users with requester roles in workflows to trusted personnel only

🧯 If You Can't Patch

  • Implement strict access controls on who can be assigned as requesters in workflows
  • Monitor approval workflow logs for unusual activity and file status changes

🔍 How to Verify

Check if Vulnerable:

Check Approval app version in Nextcloud admin settings or run: occ app:list | grep approval

Check Version:

occ app:list | grep approval

Verify Fix Applied:

Confirm Approval app version is 1.3.1 or higher (for v1 branch) or 2.5.0 or higher (for v2 branch)

📡 Detection & Monitoring

Log Indicators:

  • Unexpected file status changes to 'pending approval'
  • Approval requests from users not associated with the affected files

Network Indicators:

  • API calls to approval endpoints with file IDs not owned by the requester

SIEM Query:

source="nextcloud.log" AND "pending approval" AND user!="file_owner"

🔗 References

📤 Share & Export