Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62487: The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions. in Palantir com.palantir.acme:gotham-default-apps-bundle

0
Low
VulnerabilityCVE-2025-62487cvecve-2025-62487
Published: Fri Jan 09 2026 (01/09/2026, 21:17:37 UTC)
Source: CVE Database V5
Vendor/Project: Palantir
Product: com.palantir.acme:gotham-default-apps-bundle

Description

### Details On October 1, 2025, Palantir discovered that images uploaded through the Dossier front-end app were not being marked correctly with the proper security levels. The regression was traced back to a change in May 2025, which was meant to allow file uploads to be shared among different artifacts (e.g. other dossiers and presentations). On deployments configured with CBAC, the front-end would present a security picker dialog to set the security level on the uploads, thereby mitigating the issue. On deployments without a CBAC configuration, no security picker dialog appears, leading to a security level of CUSTOM with no markings or datasets selected. The resulting markings and groups for the file uploads thus will be only those added by the “Default authorization rules” defined in the Auth Chooser configuration. On most environments, it is expected that the “Default authorization rules" only add the Everyone group.

AI-Powered Analysis

AILast updated: 01/09/2026, 21:55:16 UTC

Technical Analysis

CVE-2025-62487 is a security vulnerability identified in Palantir's Gotham Default Apps Bundle (version 100.30250502.0). The flaw stems from a regression introduced in May 2025 intended to enable file uploads to be shared across different artifacts such as dossiers and presentations. This change inadvertently caused images uploaded through the Dossier front-end app to not be marked with the appropriate security levels. In deployments configured with Context-Based Access Control (CBAC), a security picker dialog prompts users to assign security levels to uploads, mitigating the issue. However, in deployments lacking CBAC, this dialog does not appear, resulting in uploaded files being assigned a default security level labeled CUSTOM without any specific markings or dataset associations. Consequently, the default authorization rules apply, which typically only include the Everyone group, effectively exposing these files to all users. The vulnerability allows attackers with some privileges and requiring user interaction to bypass intended access restrictions, potentially leading to unauthorized disclosure of sensitive information. The CVSS 3.1 score is 3.5 (low severity), reflecting a network attack vector with low confidentiality impact, no integrity or availability impact, and requiring privileges and user interaction. No known exploits have been reported in the wild, and Palantir has published this information as of January 2026 without a patch link provided yet.

Potential Impact

For European organizations utilizing Palantir Gotham Default Apps Bundle, this vulnerability could lead to unauthorized disclosure of sensitive images or documents uploaded via the Dossier app, especially in environments not configured with CBAC. The exposure risk is primarily confidentiality-related, as unauthorized users may gain access to files intended to be restricted. This could impact organizations handling sensitive or classified data, such as government agencies, defense contractors, or critical infrastructure operators. The lack of proper security markings could undermine compliance with European data protection regulations like GDPR if personal or sensitive data is exposed. However, the impact is somewhat limited by the requirement for some level of privilege and user interaction, and the absence of integrity or availability impacts reduces the risk of data tampering or service disruption. Still, the potential for data leakage in sensitive environments warrants attention and remediation.

Mitigation Recommendations

European organizations should first verify whether their Palantir Gotham deployments use CBAC configurations. If CBAC is enabled, the security picker dialog mitigates this vulnerability by enforcing correct security markings on uploads. For deployments without CBAC, organizations should consider enabling CBAC to restore this protection. Until a patch is available, administrators should audit uploaded files for inappropriate access permissions and restrict the 'Default authorization rules' to exclude broad groups like Everyone. Implement strict access control policies and monitor file uploads for anomalous sharing or access patterns. Additionally, organizations should educate users about the risk and encourage cautious handling of file uploads. Regularly review Palantir vendor advisories for patches or updates addressing this issue and apply them promptly once released. Finally, consider network segmentation and enhanced monitoring around Palantir systems to detect potential exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Palantir
Date Reserved
2025-10-15T00:02:28.438Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696175d145ea0302aa963f5a

Added to database: 1/9/2026, 9:40:33 PM

Last enriched: 1/9/2026, 9:55:16 PM

Last updated: 1/10/2026, 6:47:49 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats