Home

Description

Nextcloud Twofactor WebAuthn is the WebAuthn Two-Factor Provider for Nextcloud. Prior to 1.4.2 and 2.4.1, a missing ownership check allowed an attack to take-away a 2FA webauthn device when correctly guessing a 80-128 character long random string of letters, numbers and symbols. The victim would then be prompted to register a new device on the next login. The attacker can not authenticate as the victim. This vulnerability is fixed in 1.4.2 and 2.4.1.

PUBLISHED Reserved 2025-12-04 | Published 2025-12-05 | Updated 2025-12-05 | Assigner GitHub_M




LOW: 3.1CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-639: Authorization Bypass Through User-Controlled Key

Product status

< 1.4.2
affected

>= 2.0.0-beta.1, < 2.4.1
affected

References

github.com/...sories/security/advisories/GHSA-fr8x-mvjg-wf9q

github.com/nextcloud/twofactor_webauthn/pull/881

github.com/...ommit/5d2302166d31ee2e01b2e21556bd5372156da13d

hackerone.com/reports/3360354

cve.org (CVE-2025-66558)

nvd.nist.gov (CVE-2025-66558)