CVE-2025-66552

4.3 MEDIUM

📋 TL;DR

This vulnerability in Nextcloud Server causes the admin_audit app to fail to log actions on files and folders within groupfolders due to incorrect path handling. It affects Nextcloud Server and Enterprise Server installations prior to versions 30.0.9 and 31.0.1. This creates a gap in audit trails for administrative monitoring.

💻 Affected Systems

Products:
  • Nextcloud Server
  • Nextcloud Enterprise Server
Versions: All versions prior to 30.0.9 and 31.0.1
Operating Systems: All platforms running Nextcloud
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with both groupfolders and admin_audit app enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious insiders or compromised accounts could perform unauthorized file operations within groupfolders without detection in audit logs, enabling data theft or tampering that goes unrecorded.

🟠

Likely Case

Administrators lose visibility into legitimate or accidental file modifications within groupfolders, complicating incident investigation and compliance reporting.

🟢

If Mitigated

With proper access controls and monitoring of other logs, the impact is limited to incomplete audit trails rather than direct data compromise.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to perform file operations within groupfolders; the vulnerability itself is in logging, not access control.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 30.0.9 or 31.0.1

Vendor Advisory: https://github.com/nextcloud/security-advisories/security/advisories/GHSA-ww9m-f8j4-jj9x

Restart Required: No

Instructions:

1. Backup your Nextcloud installation and database. 2. Update Nextcloud to version 30.0.9 (for v30) or 31.0.1 (for v31) via the web updater or manual download. 3. Run occ upgrade via command line if needed.

🔧 Temporary Workarounds

Disable admin_audit app

linux

Temporarily disable the affected logging component until patching.

sudo -u www-data php occ app:disable admin_audit

Disable groupfolders app

linux

Remove the affected functionality if groupfolders are not essential.

sudo -u www-data php occ app:disable groupfolders

🧯 If You Can't Patch

  • Enable additional file integrity monitoring on groupfolder directories to detect changes.
  • Implement strict access controls and review user permissions for groupfolders regularly.

🔍 How to Verify

Check if Vulnerable:

Check Nextcloud version via admin panel or run: sudo -u www-data php occ status | grep version

Check Version:

sudo -u www-data php occ status | grep version

Verify Fix Applied:

After update, verify version is 30.0.9+ or 31.0.1+, then test audit logging by performing file operations in a groupfolder and checking admin_audit logs.

📡 Detection & Monitoring

Log Indicators:

  • Missing or incomplete entries in admin_audit logs for groupfolder file operations
  • Discrepancies between actual file changes and audit records

Network Indicators:

  • None specific to this vulnerability

SIEM Query:

source="nextcloud.log" AND "admin_audit" AND "groupfolder" AND (NOT "file created" OR NOT "file deleted" OR NOT "file renamed")

🔗 References

📤 Share & Export