NixOS's Onlyoffice is a software suite that offers online and offline tools for document editing, collaboration, and management. In versions from 22.11 to before 25.05 and versions before Unstable 25.11, a hard-coded secret was used in the NixOS module for the OnlyOffice document server to protect its file cache. An attacker with knowledge of an existing revision ID could use this secret to obtain a document. In practice, an arbitrary revision ID should be hard to obtain. The primary impact is likely the access to known documents from users with expired access. This issue was resolved in NixOS unstable version 25.11 and version 25.05.
Metrics
Affected Vendors & Products
References
History
Tue, 18 Nov 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nixos
Nixos nixos Onlyoffice Onlyoffice onlyoffice |
|
| Vendors & Products |
Nixos
Nixos nixos Onlyoffice Onlyoffice onlyoffice |
Mon, 17 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 17 Nov 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | NixOS's Onlyoffice is a software suite that offers online and offline tools for document editing, collaboration, and management. In versions from 22.11 to before 25.05 and versions before Unstable 25.11, a hard-coded secret was used in the NixOS module for the OnlyOffice document server to protect its file cache. An attacker with knowledge of an existing revision ID could use this secret to obtain a document. In practice, an arbitrary revision ID should be hard to obtain. The primary impact is likely the access to known documents from users with expired access. This issue was resolved in NixOS unstable version 25.11 and version 25.05. | |
| Title | NixOS has hardcoded credentials in Onlyoffice module | |
| Weaknesses | CWE-798 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-11-17T21:38:10.023Z
Updated: 2025-11-17T21:49:28.642Z
Reserved: 2025-11-10T22:29:34.877Z
Link: CVE-2025-64766
Updated: 2025-11-17T21:49:24.484Z
Status : Awaiting Analysis
Published: 2025-11-17T22:15:48.993
Modified: 2025-11-18T14:06:29.817
Link: CVE-2025-64766
No data.
ReportizFlow