Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63663: n/a

0
High
VulnerabilityCVE-2025-63663cvecve-2025-63663
Published: Mon Dec 22 2025 (12/22/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Incorrect access control in the /api/v1/conversations/*/files API of GT Edge AI Platform before v2.0.10 allows unauthorized attackers to access other users' uploaded files.

AI-Powered Analysis

AILast updated: 12/22/2025, 18:41:04 UTC

Technical Analysis

CVE-2025-63663 is a security vulnerability identified in the GT Edge AI Platform, specifically affecting versions prior to 2.0.10. The vulnerability exists due to incorrect access control mechanisms in the /api/v1/conversations/*/files API endpoint. This endpoint is designed to handle user-uploaded files within conversation contexts. However, due to improper authorization checks, an attacker can bypass restrictions and access files uploaded by other users, violating data confidentiality. This flaw does not require authentication or user interaction, making it easier to exploit if the API endpoint is exposed. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk of unauthorized data disclosure. The absence of a CVSS score suggests the need for a severity assessment based on the impact on confidentiality, ease of exploitation, and scope of affected systems. The vulnerability primarily compromises confidentiality, as unauthorized users can access sensitive files belonging to others. The GT Edge AI Platform is used in AI-driven edge computing environments, which may include critical industrial, commercial, or governmental applications. Failure to address this vulnerability could lead to data breaches, loss of user trust, and regulatory non-compliance, especially under stringent European data protection laws such as GDPR.

Potential Impact

For European organizations, the impact of CVE-2025-63663 can be significant, particularly for those leveraging the GT Edge AI Platform in sensitive or regulated environments. Unauthorized access to user-uploaded files can lead to exposure of confidential business information, personal data, or intellectual property. This can result in reputational damage, financial losses, and potential legal penalties under GDPR and other data protection regulations. Organizations in sectors such as finance, healthcare, manufacturing, and government are especially vulnerable due to the sensitive nature of their data. Additionally, the breach of confidentiality could facilitate further attacks, including social engineering or targeted intrusions. The lack of authentication requirements for exploitation increases the risk of automated or opportunistic attacks. European entities deploying AI platforms at the edge must consider the risk of lateral movement within their networks if attackers gain access to sensitive files. Overall, the vulnerability undermines trust in AI platform security and could disrupt critical operations if exploited.

Mitigation Recommendations

To mitigate CVE-2025-63663, European organizations should immediately upgrade the GT Edge AI Platform to version 2.0.10 or later, where the access control flaw has been addressed. In the absence of an immediate upgrade, organizations should implement strict network segmentation to restrict access to the vulnerable API endpoint, limiting exposure to trusted users and systems only. Employing Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized API requests can provide interim protection. Conduct thorough access control audits on all API endpoints to ensure proper authorization checks are enforced. Monitoring and logging access to the /api/v1/conversations/*/files endpoint can help detect suspicious activity early. Organizations should also review and tighten user permission models within the platform to minimize unnecessary file access. Finally, educating developers and administrators about secure API design and access control best practices will reduce the risk of similar vulnerabilities in the future.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69498ef9c525bff625d87af4

Added to database: 12/22/2025, 6:33:29 PM

Last enriched: 12/22/2025, 6:41:04 PM

Last updated: 12/23/2025, 8:17:17 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats