Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62487: The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions. in Palantir com.palantir.acme:gotham-default-apps-bundle

0
Low
VulnerabilityCVE-2025-62487cvecve-2025-62487
Published: Fri Jan 09 2026 (01/09/2026, 21:17:37 UTC)
Source: CVE Database V5
Vendor/Project: Palantir
Product: com.palantir.acme:gotham-default-apps-bundle

Description

On October 1, 2025, Palantir discovered that images uploaded through the Dossier front-end app were not being marked correctly with the proper security levels. The regression was traced back to a change in May 2025, which was meant to allow file uploads to be shared among different artifacts (e.g. other dossiers and presentations). On deployments configured with CBAC, the front-end would present a security picker dialog to set the security level on the uploads, thereby mitigating the issue. On deployments without a CBAC configuration, no security picker dialog appears, leading to a security level of CUSTOM with no markings or datasets selected. The resulting markings and groups for the file uploads thus will be only those added by the default authorization rules defined in the Auth Chooser configuration. On most environments, it is expected that the default authorization rules only add the Everyone group.

AI-Powered Analysis

AILast updated: 01/17/2026, 07:35:56 UTC

Technical Analysis

CVE-2025-62487 is a security vulnerability identified in Palantir's Gotham Default Apps Bundle (version 100.30250502.0) affecting the authorization mechanism for image uploads through the Dossier front-end application. The issue originated from a regression introduced in May 2025 intended to enable file sharing across different artifacts such as dossiers and presentations. In deployments configured with Context-Based Access Control (CBAC), a security picker dialog prompts users to assign appropriate security levels to uploaded files, mitigating the risk. However, in environments lacking CBAC configuration, this dialog does not appear, causing uploaded images to be assigned a default CUSTOM security level without proper markings or dataset associations. Consequently, the authorization rules applied default to granting access to the Everyone group, effectively bypassing intended access restrictions. This flaw allows actors with limited privileges to access files beyond their authorization scope, undermining confidentiality. The vulnerability requires the attacker to have some privileges (PR:L) and user interaction (UI:R) but does not impact integrity or availability. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N/CR:H/IR:H/AR:H) reflects a low severity rating with a low impact on confidentiality and no impact on integrity or availability. No public exploits have been reported, and Palantir has acknowledged the issue. The root cause is a missing or incorrect authorization check due to the absence of CBAC configuration, highlighting the importance of proper security policy enforcement in multi-tenant or shared artifact environments.

Potential Impact

For European organizations using Palantir Gotham Default Apps Bundle, this vulnerability could lead to unauthorized disclosure of sensitive or confidential information contained in uploaded images. Since the default authorization rules often grant access to the Everyone group, files intended to be restricted could be exposed broadly within the organization or even to external users if network segmentation is weak. This exposure risks violating data protection regulations such as GDPR, potentially resulting in legal and reputational damage. The impact is primarily on confidentiality, with no direct effect on data integrity or system availability. Organizations relying on CBAC configurations are less affected, but those without it or with misconfigured authorization policies face increased risk. The requirement for some privileges and user interaction limits the threat to insider actors or users with limited access, rather than external unauthenticated attackers. However, given Palantir's use in critical sectors including government, defense, and intelligence across Europe, even limited unauthorized access could have serious operational and strategic consequences.

Mitigation Recommendations

European organizations should immediately verify whether their Palantir Gotham deployments use CBAC configurations. If not configured, they should enable CBAC to ensure the security picker dialog appears and correct security levels are assigned to uploads. Review and tighten the default authorization rules in the Auth Chooser configuration to avoid overly permissive access such as granting Everyone group rights by default. Implement strict role-based access controls and audit logs to monitor file uploads and access patterns. Conduct thorough testing after applying any patches or configuration changes to confirm that security markings are correctly applied. Additionally, restrict upload privileges to trusted users and consider network segmentation to limit exposure of sensitive data. Engage with Palantir support for any available patches or updates addressing this regression. Finally, provide user training to raise awareness about the importance of correctly setting security levels on uploaded content.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Palantir
Date Reserved
2025-10-15T00:02:28.438Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696175d145ea0302aa963f5a

Added to database: 1/9/2026, 9:40:33 PM

Last enriched: 1/17/2026, 7:35:56 AM

Last updated: 2/7/2026, 6:55:06 AM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats