4.3

CVE-2025-66558

Nextcloud Twofactor WebAuthn app was updated based on public key

WebAuthn app was updated based on public key

Nextcloud Twofactor WebAuthn is the WebAuthn Two-Factor Provider for Nextcloud. Prior to 1.4.2 and 2.4.1, a missing ownership check allowed an attack to take-away a 2FA webauthn device when correctly guessing a 80-128 character long random string of letters, numbers and symbols. The victim would then be prompted to register a new device on the next login. The attacker can not authenticate as the victim. This vulnerability is fixed in 1.4.2 and 2.4.1.
Mögliche Gegenmaßnahme
Twofactor WebAuthn: * No workaround available
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
NextcloudTwo-factor Webauthn Version >= 1.0.0 < 1.4.2
NextcloudTwo-factor Webauthn Version >= 2.0.0 < 2.4.1
Weitere Schwachstelleninformationen
SystemNextcloud App
Produkt Twofactor WebAuthn
Version >= 1.0.0, < 1.4.2
Version >= 2.0.0, < 2.4.1
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.049
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4.3 2.8 1.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
security-advisories@github.com 3.1 1.6 1.4
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
CWE-639 Authorization Bypass Through User-Controlled Key

The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.