Skip to main content

CVE-2025-11239: CWE-863 Incorrect Authorization in KNIME KNIME Business Hub

Low
VulnerabilityCVE-2025-11239cvecve-2025-11239cwe-863
Published: Thu Oct 02 2025 (10/02/2025, 12:23:18 UTC)
Source: CVE Database V5
Vendor/Project: KNIME
Product: KNIME Business Hub

Description

Potentially sensitive information in jobs on KNIME Business Hub prior to 1.16.0 were visible to all members of the user's team. Starting with KNIME Business Hub 1.16.0 only metadata of jobs is shown to team members. Only the creator of a job can see all information including in- and output data (if present).

AI-Powered Analysis

AILast updated: 10/02/2025, 12:31:43 UTC

Technical Analysis

CVE-2025-11239 is a vulnerability classified under CWE-863 (Incorrect Authorization) affecting KNIME Business Hub versions prior to 1.16.0. The issue arises from improper access control mechanisms within the platform, where sensitive information contained in jobs was accessible to all members of a user's team rather than being restricted solely to the job creator. This exposure includes potentially sensitive in- and output data associated with the jobs. Starting with version 1.16.0, KNIME addressed this vulnerability by limiting team members' visibility to only metadata of jobs, ensuring that only the creator can access full job details and data. The vulnerability has a CVSS 4.0 base score of 2.3, indicating a low severity level. The vector indicates that the attack vector is network-based (AV:N), with low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N). The vulnerability impacts confidentiality to a limited extent (VC:L) but does not affect integrity or availability. No known exploits are reported in the wild. The root cause is an authorization flaw where team members could view sensitive job data without proper permission checks. This could lead to unauthorized disclosure of sensitive business or analytical data processed within KNIME workflows, potentially exposing proprietary or confidential information to unintended internal users. However, the impact is limited to users within the same team, and exploitation requires at least low-level privileges within the platform.

Potential Impact

For European organizations using KNIME Business Hub, particularly those handling sensitive or proprietary data in their data analytics workflows, this vulnerability could lead to unauthorized internal data exposure. While the risk is limited to team members within the same organizational unit, this could still result in breaches of confidentiality, especially in regulated industries such as finance, healthcare, or critical infrastructure where data privacy is paramount. The exposure of input and output data from analytical jobs could reveal sensitive business insights, personal data, or intellectual property. Given the low CVSS score and the requirement for at least low-level privileges, the threat is moderate but should not be ignored. Organizations with collaborative teams using KNIME Business Hub versions prior to 1.16.0 should be aware of the risk of insider data leaks or accidental data exposure. The vulnerability does not impact system availability or integrity, so operational disruption is unlikely. However, compliance with GDPR and other European data protection regulations may be affected if sensitive personal data is exposed internally without proper authorization controls.

Mitigation Recommendations

European organizations should upgrade KNIME Business Hub to version 1.16.0 or later, where the authorization model has been corrected to restrict sensitive job data visibility to the job creator only. Until the upgrade is applied, organizations should implement strict access controls at the team level, limiting membership to trusted users and minimizing the number of users with low-level privileges who can access job data. Additionally, organizations should audit existing job data exposure within teams to identify any sensitive information that may have been improperly shared. Implementing monitoring and alerting on unusual access patterns to job data can help detect potential misuse. Training and awareness for users about the sensitivity of job data and the importance of access controls within KNIME Business Hub are also recommended. Finally, organizations should review internal policies to ensure that data sharing within teams complies with data protection requirements and consider encrypting sensitive data inputs and outputs where feasible.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
KNIME
Date Reserved
2025-10-02T12:05:47.957Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68de708c9a610dc11233fc63

Added to database: 10/2/2025, 12:31:08 PM

Last enriched: 10/2/2025, 12:31:43 PM

Last updated: 10/2/2025, 1:18:21 PM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats