Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63291: n/a

0
Medium
VulnerabilityCVE-2025-63291cvecve-2025-63291
Published: Fri Nov 14 2025 (11/14/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

When processing API requests, the Alteryx server 2022.1.1.42654 and 2024.1 used MongoDB object IDs to uniquely identify the data being requested by the caller. The Alteryx server did not check whether the authenticated user had permission to access the specified MongoDB object ID. By specifying particlar MongoDB object IDs, callers could obtain records for other users without proper authorization. Records retrievable using this attack included administrative API keys and private studio api keys.

AI-Powered Analysis

AILast updated: 11/21/2025, 20:02:25 UTC

Technical Analysis

CVE-2025-63291 is a security vulnerability identified in Alteryx Server versions 2022.1.1.42654 and 2024.1. The issue arises from improper authorization checks during API request processing. Specifically, the server uses MongoDB object IDs to uniquely identify data records requested by authenticated users but fails to verify whether the requesting user has permission to access the specified object ID. This lack of access control allows an authenticated user to specify arbitrary MongoDB object IDs and retrieve data belonging to other users without proper authorization. The exposed data can include sensitive information such as administrative API keys and private studio API keys, which are critical for managing and accessing the Alteryx environment. The vulnerability is classified under CWE-648 (Exposure of Resource to Wrong Sphere) and has a CVSS v3.1 base score of 5.4, indicating medium severity. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and needs privileges (PR:L) but no user interaction (UI:N). The scope remains unchanged (S:U), and the impact affects confidentiality and integrity to a limited extent (C:L/I:L/A:N). No patches or known exploits have been reported at the time of publication. The vulnerability could be exploited remotely by authenticated users to gain unauthorized access to sensitive data, potentially enabling further attacks or data leakage within the Alteryx Server environment.

Potential Impact

For European organizations, this vulnerability poses a significant risk to data confidentiality and integrity within Alteryx Server deployments. Exposure of administrative and private API keys can lead to unauthorized access to critical analytics workflows, data manipulation, or lateral movement within the environment. Organizations handling sensitive or regulated data (e.g., financial, healthcare, or personal data under GDPR) may face compliance violations and reputational damage if such data is accessed or exfiltrated. The medium severity score reflects that while the vulnerability does not allow full system compromise or denial of service, the unauthorized disclosure of API keys can facilitate privilege escalation or persistent unauthorized access. Given the widespread use of Alteryx in data analytics and business intelligence across Europe, especially in sectors like finance, manufacturing, and public administration, the impact could be material. Additionally, the vulnerability could be leveraged in targeted attacks against organizations with valuable data assets or strategic importance.

Mitigation Recommendations

1. Immediate mitigation should involve restricting API access to trusted users and enforcing strict role-based access controls within Alteryx Server to limit the scope of accessible MongoDB object IDs. 2. Monitor API request logs for unusual access patterns or attempts to query arbitrary object IDs. 3. Rotate all administrative and private API keys that may have been exposed or are at risk. 4. Implement network-level segmentation and firewall rules to restrict access to the Alteryx Server API endpoints only to authorized systems and users. 5. Engage with Alteryx support or vendor channels to obtain official patches or updates addressing this vulnerability as they become available. 6. Conduct a thorough audit of user permissions and API key usage to identify and remediate any unauthorized access. 7. Educate administrators and developers on secure API usage and the importance of validating authorization checks on all data requests. 8. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious API calls referencing unauthorized MongoDB object IDs. These measures collectively reduce the risk of exploitation until a vendor patch is released.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69177ea4901ba91f3226fd5b

Added to database: 11/14/2025, 7:10:28 PM

Last enriched: 11/21/2025, 8:02:25 PM

Last updated: 12/30/2025, 11:33:32 AM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats