CVE-2025-53709: The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action. in Palantir com.palantir.secupload:secure-upload
Secure-upload is a data submission service that validates single-use tokens when accepting submissions to channels. The service only installed on a small number of environments. Under specific circumstances, privileged users of secure-upload could have selected email templates not necessarily created for their enrollment when sending data upload requests. Authenticated and privileged users of one enrollment could have abused an endpoint to redirect existing submission channels to a dataset they control. An endpoint handling domain validation allowed unauthenticated users to enumerate existing enrollments. Finally, other endpoints allowed enumerating if a resource with a known RID exists across enrollments. The affected service has been patched with version 0.815.0 and automatically deployed to all Apollo-managed Foundry instances.
AI Analysis
Technical Summary
CVE-2025-53709 is a medium-severity vulnerability affecting Palantir's secure-upload service (com.palantir.secupload:secure-upload), a data submission platform that validates single-use tokens for channel submissions. The vulnerability arises from improper or missing authorization checks when actors attempt to access resources or perform actions. Specifically, privileged users within one enrollment could exploit the service to select email templates not originally created for their enrollment, potentially leading to unauthorized data upload requests. Moreover, authenticated privileged users could abuse an endpoint to redirect existing submission channels to datasets under their control, effectively hijacking data flows. Additionally, an endpoint responsible for domain validation permitted unauthenticated users to enumerate existing enrollments, exposing sensitive metadata about the system's structure. Other endpoints allowed enumeration of resources by known resource IDs (RIDs) across enrollments, further increasing information disclosure risks. These issues collectively indicate a failure in enforcing strict access controls and authorization boundaries between enrollments and users. The vulnerability affects all versions of the secure-upload service prior to the patched release 0.815.0, which has been automatically deployed to all Apollo-managed Foundry instances. The CVSS 3.1 base score is 5.4, reflecting a medium severity level due to network exploitability, low attack complexity, required privileges, no user interaction, and limited confidentiality and integrity impacts without availability impact. No known exploits are currently reported in the wild. The vulnerability primarily compromises confidentiality and integrity by enabling unauthorized data access and manipulation through privilege abuse and information disclosure via enumeration endpoints.
Potential Impact
For European organizations using Palantir Foundry with the secure-upload service, this vulnerability could lead to unauthorized access and manipulation of sensitive data submissions. Privileged users abusing the authorization flaws might redirect data channels to datasets they control, potentially causing data leakage or corruption. The ability for unauthenticated actors to enumerate enrollments and resource existence increases the risk of targeted attacks, reconnaissance, and subsequent exploitation. This could be particularly impactful for sectors handling sensitive or regulated data such as finance, healthcare, and government agencies within Europe. The exposure of enrollment metadata may also facilitate social engineering or insider threat activities. While the vulnerability does not directly cause denial of service, the integrity and confidentiality risks could undermine trust in data submission processes and compliance with data protection regulations like GDPR. Organizations relying on Apollo-managed Foundry instances benefit from automatic patch deployment, but those with self-managed or older versions remain at risk. Overall, the threat could disrupt secure data workflows and expose sensitive information, necessitating prompt remediation to maintain operational security and regulatory compliance.
Mitigation Recommendations
European organizations should verify that their Palantir secure-upload service is updated to version 0.815.0 or later, ensuring the patch addressing CVE-2025-53709 is applied. For self-managed instances, immediate manual patching is critical. Organizations should audit privileged user roles and permissions within the secure-upload environment to enforce the principle of least privilege, limiting the ability to select email templates or redirect submission channels outside their enrollment scope. Implement monitoring and alerting on unusual activities such as channel redirections or access attempts to unauthorized templates. Restrict access to domain validation and resource enumeration endpoints by applying additional authentication or network-level controls (e.g., IP whitelisting, VPN access) to prevent unauthenticated enumeration. Conduct regular security assessments and penetration tests focused on authorization controls within the secure-upload service. Additionally, review and enhance logging to capture detailed access and modification events for forensic analysis. Finally, educate privileged users on secure usage policies to reduce insider risk and ensure compliance with data handling standards.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Belgium, Italy
CVE-2025-53709: The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action. in Palantir com.palantir.secupload:secure-upload
Description
Secure-upload is a data submission service that validates single-use tokens when accepting submissions to channels. The service only installed on a small number of environments. Under specific circumstances, privileged users of secure-upload could have selected email templates not necessarily created for their enrollment when sending data upload requests. Authenticated and privileged users of one enrollment could have abused an endpoint to redirect existing submission channels to a dataset they control. An endpoint handling domain validation allowed unauthenticated users to enumerate existing enrollments. Finally, other endpoints allowed enumerating if a resource with a known RID exists across enrollments. The affected service has been patched with version 0.815.0 and automatically deployed to all Apollo-managed Foundry instances.
AI-Powered Analysis
Technical Analysis
CVE-2025-53709 is a medium-severity vulnerability affecting Palantir's secure-upload service (com.palantir.secupload:secure-upload), a data submission platform that validates single-use tokens for channel submissions. The vulnerability arises from improper or missing authorization checks when actors attempt to access resources or perform actions. Specifically, privileged users within one enrollment could exploit the service to select email templates not originally created for their enrollment, potentially leading to unauthorized data upload requests. Moreover, authenticated privileged users could abuse an endpoint to redirect existing submission channels to datasets under their control, effectively hijacking data flows. Additionally, an endpoint responsible for domain validation permitted unauthenticated users to enumerate existing enrollments, exposing sensitive metadata about the system's structure. Other endpoints allowed enumeration of resources by known resource IDs (RIDs) across enrollments, further increasing information disclosure risks. These issues collectively indicate a failure in enforcing strict access controls and authorization boundaries between enrollments and users. The vulnerability affects all versions of the secure-upload service prior to the patched release 0.815.0, which has been automatically deployed to all Apollo-managed Foundry instances. The CVSS 3.1 base score is 5.4, reflecting a medium severity level due to network exploitability, low attack complexity, required privileges, no user interaction, and limited confidentiality and integrity impacts without availability impact. No known exploits are currently reported in the wild. The vulnerability primarily compromises confidentiality and integrity by enabling unauthorized data access and manipulation through privilege abuse and information disclosure via enumeration endpoints.
Potential Impact
For European organizations using Palantir Foundry with the secure-upload service, this vulnerability could lead to unauthorized access and manipulation of sensitive data submissions. Privileged users abusing the authorization flaws might redirect data channels to datasets they control, potentially causing data leakage or corruption. The ability for unauthenticated actors to enumerate enrollments and resource existence increases the risk of targeted attacks, reconnaissance, and subsequent exploitation. This could be particularly impactful for sectors handling sensitive or regulated data such as finance, healthcare, and government agencies within Europe. The exposure of enrollment metadata may also facilitate social engineering or insider threat activities. While the vulnerability does not directly cause denial of service, the integrity and confidentiality risks could undermine trust in data submission processes and compliance with data protection regulations like GDPR. Organizations relying on Apollo-managed Foundry instances benefit from automatic patch deployment, but those with self-managed or older versions remain at risk. Overall, the threat could disrupt secure data workflows and expose sensitive information, necessitating prompt remediation to maintain operational security and regulatory compliance.
Mitigation Recommendations
European organizations should verify that their Palantir secure-upload service is updated to version 0.815.0 or later, ensuring the patch addressing CVE-2025-53709 is applied. For self-managed instances, immediate manual patching is critical. Organizations should audit privileged user roles and permissions within the secure-upload environment to enforce the principle of least privilege, limiting the ability to select email templates or redirect submission channels outside their enrollment scope. Implement monitoring and alerting on unusual activities such as channel redirections or access attempts to unauthorized templates. Restrict access to domain validation and resource enumeration endpoints by applying additional authentication or network-level controls (e.g., IP whitelisting, VPN access) to prevent unauthenticated enumeration. Conduct regular security assessments and penetration tests focused on authorization controls within the secure-upload service. Additionally, review and enhance logging to capture detailed access and modification events for forensic analysis. Finally, educate privileged users on secure usage policies to reduce insider risk and ensure compliance with data handling standards.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Palantir
- Date Reserved
- 2025-07-08T20:11:55.448Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68700a6fa83201eaaca94483
Added to database: 7/10/2025, 6:46:07 PM
Last enriched: 7/10/2025, 7:01:27 PM
Last updated: 8/14/2025, 10:41:30 PM
Views: 21
Related Threats
CVE-2025-8066: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in Bunkerity Bunker Web
MediumCVE-2025-49898: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Xolluteon Dropshix
MediumCVE-2025-55207: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in withastro astro
MediumCVE-2025-49897: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in gopiplus Vertical scroll slideshow gallery v2
HighCVE-2025-49432: CWE-862 Missing Authorization in FWDesign Ultimate Video Player
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.