{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-66558","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2025-12-04T16:01:32.473Z","datePublished":"2025-12-05T18:00:49.792Z","dateUpdated":"2025-12-05T18:35:53.477Z"},"containers":{"cna":{"title":"Nextcloud Twofactor WebAuthn app was updated based on public key","problemTypes":[{"descriptions":[{"cweId":"CWE-639","lang":"en","description":"CWE-639: Authorization Bypass Through User-Controlled Key","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":3.1,"baseSeverity":"LOW","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fr8x-mvjg-wf9q","tags":["x_refsource_CONFIRM"],"url":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fr8x-mvjg-wf9q"},{"name":"https://github.com/nextcloud/twofactor_webauthn/pull/881","tags":["x_refsource_MISC"],"url":"https://github.com/nextcloud/twofactor_webauthn/pull/881"},{"name":"https://github.com/nextcloud/twofactor_webauthn/commit/5d2302166d31ee2e01b2e21556bd5372156da13d","tags":["x_refsource_MISC"],"url":"https://github.com/nextcloud/twofactor_webauthn/commit/5d2302166d31ee2e01b2e21556bd5372156da13d"},{"name":"https://hackerone.com/reports/3360354","tags":["x_refsource_MISC"],"url":"https://hackerone.com/reports/3360354"}],"affected":[{"vendor":"nextcloud","product":"security-advisories","versions":[{"version":"< 1.4.2","status":"affected"},{"version":">= 2.0.0-beta.1, < 2.4.1","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2025-12-05T18:00:49.792Z"},"descriptions":[{"lang":"en","value":"Nextcloud Twofactor WebAuthn is the WebAuthn Two-Factor Provider for Nextcloud. Prior to 1.4.2 and 2.4.1, a missing ownership check allowed an attack to take-away a 2FA webauthn device when correctly guessing a 80-128 character long random string of letters, numbers and symbols. The victim would then be prompted to register a new device on the next login. The attacker can not authenticate as the victim. This vulnerability is fixed in 1.4.2 and 2.4.1."}],"source":{"advisory":"GHSA-fr8x-mvjg-wf9q","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-05T18:35:39.199259Z","id":"CVE-2025-66558","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-05T18:35:53.477Z"}}]}}