CVE-2025-62487 (GCVE-0-2025-62487)
Vulnerability from cvelistv5
Published
2026-01-09 21:17
Modified
2026-01-14 19:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-863 - The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.
Summary
On October 1, 2025, Palantir discovered that images uploaded through the Dossier front-end app were not being marked correctly with the proper security levels. The regression was traced back to a change in May 2025, which was meant to allow file uploads to be shared among different artifacts (e.g. other dossiers and presentations).
On deployments configured with CBAC, the front-end would present a security picker dialog to set the security level on the uploads, thereby mitigating the issue.
On deployments without a CBAC configuration, no security picker dialog appears, leading to a security level of CUSTOM with no markings or datasets selected. The resulting markings and groups for the file uploads thus will be only those added by the default authorization rules defined in the Auth Chooser configuration. On most environments, it is expected that the default authorization rules only add the Everyone group.
References
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Palantir | com.palantir.acme:gotham-default-apps-bundle |
Version: 100.30250502.0 ≤ |
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-62487",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-01-09T21:36:19.288885Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-01-09T21:36:29.093Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "com.palantir.acme:gotham-default-apps-bundle",
"vendor": "Palantir",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "100.30251002.0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "100.30250808.87"
},
{
"status": "unaffected",
"version": "100.30250908.1"
},
{
"lessThan": "100.30251002.0",
"status": "affected",
"version": "100.30250502.0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "100.30250709.54"
},
{
"status": "unaffected",
"version": "100.30250907.11"
},
{
"status": "unaffected",
"version": "100.30250507.88"
},
{
"status": "unaffected",
"version": "100.30251001.1"
},
{
"lessThan": "100.30250502.0",
"status": "unaffected",
"version": "*",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "100.30250906.52"
}
]
},
{
"product": "com.palantir.acme:stencil-app-bundle",
"vendor": "Palantir",
"versions": [
{
"status": "unaffected",
"version": "100.30250907.11"
},
{
"status": "unaffected",
"version": "100.30250507.88"
},
{
"status": "unaffected",
"version": "100.30250908.1"
},
{
"status": "unaffected",
"version": "100.30250808.87"
},
{
"lessThan": "*",
"status": "unaffected",
"version": "100.30251002.0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "100.30251001.1"
},
{
"lessThan": "100.30250502.0",
"status": "unaffected",
"version": "*",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "100.30250906.52"
},
{
"lessThan": "100.30251002.0",
"status": "affected",
"version": "100.30250502.0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "100.30250709.54"
}
]
},
{
"product": "com.palantir.acme:dossier-app",
"vendor": "Palantir",
"versions": [
{
"status": "unaffected",
"version": "100.30250907.11"
},
{
"lessThan": "100.30251002.0",
"status": "affected",
"version": "100.30250502.0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "100.30251001.1"
},
{
"status": "unaffected",
"version": "100.30250808.87"
},
{
"lessThan": "100.30250502.0",
"status": "unaffected",
"version": "*",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "100.30250908.1"
},
{
"status": "unaffected",
"version": "100.30250709.54"
},
{
"lessThan": "*",
"status": "unaffected",
"version": "100.30251002.0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "100.30250507.88"
},
{
"status": "unaffected",
"version": "100.30250906.52"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "On October 1, 2025, Palantir discovered that images uploaded through the Dossier front-end app were not being marked correctly with the proper security levels. The regression was traced back to a change in May 2025, which was meant to allow file uploads to be shared among different artifacts (e.g. other dossiers and presentations).\n\n\nOn deployments configured with CBAC, the front-end would present a security picker dialog to set the security level on the uploads, thereby mitigating the issue.\n\n\nOn deployments without a CBAC configuration, no security picker dialog appears, leading to a security level of CUSTOM with no markings or datasets selected. The resulting markings and groups for the file uploads thus will be only those added by the default authorization rules defined in the Auth Chooser configuration. On most environments, it is expected that the default authorization rules only add the Everyone group."
}
],
"impacts": [
{
"capecId": "CAPEC-180",
"descriptions": [
{
"lang": "en",
"value": "An attacker exploits a weakness in the configuration of access controls and is able to bypass the intended protection that these measures guard against and thereby obtain unauthorized access to the system or network. Sensitive functionality should always be protected with access controls. However configuring all but the most trivial access control systems can be very complicated and there are many opportunities for mistakes. If an attacker can learn of incorrectly configured access security settings, they may be able to exploit this in an attack."
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N/CR:H/IR:H/AR:H",
"version": "3.1"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-863",
"description": "The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-14T19:10:00.918Z",
"orgId": "bbcbe11d-db20-4bc2-8a6e-c79f87041fd4",
"shortName": "Palantir"
},
"references": [
{
"url": "https://palantir.safebase.us/?tcuUid=c91a1b4f-72e7-4959-9e2d-3a341e5c7a1f"
}
],
"source": {
"defect": [
"PLTRSEC-2025-49"
],
"discovery": "INTERNAL"
},
"title": "Under certain configurations, file artifacts uploaded to the Dossier and Slides apps did not inherit security markings of their parent artifact. This lack of security markings could lead to unintended access to the uploaded files."
}
},
"cveMetadata": {
"assignerOrgId": "bbcbe11d-db20-4bc2-8a6e-c79f87041fd4",
"assignerShortName": "Palantir",
"cveId": "CVE-2025-62487",
"datePublished": "2026-01-09T21:17:37.023Z",
"dateReserved": "2025-10-15T00:02:28.438Z",
"dateUpdated": "2026-01-14T19:10:00.918Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-62487\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-01-09T21:36:19.288885Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-01-09T21:36:25.824Z\"}}], \"cna\": {\"title\": \"Under certain configurations, file artifacts uploaded to the Dossier and Slides apps did not inherit security markings of their parent artifact. This lack of security markings could lead to unintended access to the uploaded files.\", \"source\": {\"defect\": [\"PLTRSEC-2025-49\"], \"discovery\": \"INTERNAL\"}, \"impacts\": [{\"capecId\": \"CAPEC-180\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"An attacker exploits a weakness in the configuration of access controls and is able to bypass the intended protection that these measures guard against and thereby obtain unauthorized access to the system or network. Sensitive functionality should always be protected with access controls. However configuring all but the most trivial access control systems can be very complicated and there are many opportunities for mistakes. If an attacker can learn of incorrectly configured access security settings, they may be able to exploit this in an attack.\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 3.5, \"baseSeverity\": \"LOW\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N/CR:H/IR:H/AR:H\"}}], \"affected\": [{\"vendor\": \"Palantir\", \"product\": \"com.palantir.acme:gotham-default-apps-bundle\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"100.30251002.0\", \"lessThan\": \"*\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"100.30250808.87\"}, {\"status\": \"unaffected\", \"version\": \"100.30250908.1\"}, {\"status\": \"affected\", \"version\": \"100.30250502.0\", \"lessThan\": \"100.30251002.0\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"100.30250709.54\"}, {\"status\": \"unaffected\", \"version\": \"100.30250907.11\"}, {\"status\": \"unaffected\", \"version\": \"100.30250507.88\"}, {\"status\": \"unaffected\", \"version\": \"100.30251001.1\"}, {\"status\": \"unaffected\", \"version\": \"*\", \"lessThan\": \"100.30250502.0\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"100.30250906.52\"}]}, {\"vendor\": \"Palantir\", \"product\": \"com.palantir.acme:stencil-app-bundle\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"100.30250907.11\"}, {\"status\": \"unaffected\", \"version\": \"100.30250507.88\"}, {\"status\": \"unaffected\", \"version\": \"100.30250908.1\"}, {\"status\": \"unaffected\", \"version\": \"100.30250808.87\"}, {\"status\": \"unaffected\", \"version\": \"100.30251002.0\", \"lessThan\": \"*\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"100.30251001.1\"}, {\"status\": \"unaffected\", \"version\": \"*\", \"lessThan\": \"100.30250502.0\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"100.30250906.52\"}, {\"status\": \"affected\", \"version\": \"100.30250502.0\", \"lessThan\": \"100.30251002.0\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"100.30250709.54\"}]}, {\"vendor\": \"Palantir\", \"product\": \"com.palantir.acme:dossier-app\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"100.30250907.11\"}, {\"status\": \"affected\", \"version\": \"100.30250502.0\", \"lessThan\": \"100.30251002.0\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"100.30251001.1\"}, {\"status\": \"unaffected\", \"version\": \"100.30250808.87\"}, {\"status\": \"unaffected\", \"version\": \"*\", \"lessThan\": \"100.30250502.0\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"100.30250908.1\"}, {\"status\": \"unaffected\", \"version\": \"100.30250709.54\"}, {\"status\": \"unaffected\", \"version\": \"100.30251002.0\", \"lessThan\": \"*\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"100.30250507.88\"}, {\"status\": \"unaffected\", \"version\": \"100.30250906.52\"}]}], \"references\": [{\"url\": \"https://palantir.safebase.us/?tcuUid=c91a1b4f-72e7-4959-9e2d-3a341e5c7a1f\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"On October 1, 2025, Palantir discovered that images uploaded through the Dossier front-end app were not being marked correctly with the proper security levels. The regression was traced back to a change in May 2025, which was meant to allow file uploads to be shared among different artifacts (e.g. other dossiers and presentations).\\n\\n\\nOn deployments configured with CBAC, the front-end would present a security picker dialog to set the security level on the uploads, thereby mitigating the issue.\\n\\n\\nOn deployments without a CBAC configuration, no security picker dialog appears, leading to a security level of CUSTOM with no markings or datasets selected. The resulting markings and groups for the file uploads thus will be only those added by the default authorization rules defined in the Auth Chooser configuration. On most environments, it is expected that the default authorization rules only add the Everyone group.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-863\", \"description\": \"The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.\"}]}], \"providerMetadata\": {\"orgId\": \"bbcbe11d-db20-4bc2-8a6e-c79f87041fd4\", \"shortName\": \"Palantir\", \"dateUpdated\": \"2026-01-14T19:10:00.918Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-62487\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-01-14T19:10:00.918Z\", \"dateReserved\": \"2025-10-15T00:02:28.438Z\", \"assignerOrgId\": \"bbcbe11d-db20-4bc2-8a6e-c79f87041fd4\", \"datePublished\": \"2026-01-09T21:17:37.023Z\", \"assignerShortName\": \"Palantir\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…