Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63664: n/a

0
High
VulnerabilityCVE-2025-63664cvecve-2025-63664
Published: Mon Dec 22 2025 (12/22/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Incorrect access control in the /api/v1/conversations/*/messages API of GT Edge AI Platform before v2.0.10-dev allows unauthorized attackers to access other users' message history with AI agents.

AI-Powered Analysis

AILast updated: 12/22/2025, 18:41:15 UTC

Technical Analysis

CVE-2025-63664 identifies a critical security vulnerability in the GT Edge AI Platform, specifically affecting versions prior to 2.0.10-dev. The vulnerability arises from incorrect access control in the /api/v1/conversations/*/messages REST API endpoint, which is designed to provide users access to their message history with AI agents. Due to improper authorization checks, unauthorized attackers can exploit this flaw to retrieve message histories belonging to other users. This unauthorized access can lead to exposure of sensitive conversational data, potentially including personal, confidential, or proprietary information exchanged with AI agents. The vulnerability does not require authentication or user interaction, increasing its risk profile. Although no public exploits have been reported, the flaw's nature suggests it could be leveraged by attackers to conduct reconnaissance or data theft. The absence of a CVSS score indicates that the vulnerability is newly published and pending formal assessment. The platform's role in managing AI-driven conversations makes this vulnerability particularly concerning for organizations relying on AI for customer interaction, support, or internal communications. The flaw underscores the importance of robust API security and access control mechanisms in AI platforms.

Potential Impact

For European organizations, the impact of CVE-2025-63664 could be significant, especially those using the GT Edge AI Platform for customer service, internal communications, or AI-driven analytics. Unauthorized access to message histories can lead to breaches of confidentiality, exposing sensitive personal data or business-critical information. This exposure risks violating stringent European data protection regulations such as GDPR, potentially resulting in legal penalties and fines. Additionally, compromised conversational data could be used for social engineering, identity theft, or corporate espionage. The reputational damage from such a breach could erode customer trust and impact business operations. Given the platform’s integration in AI workflows, the vulnerability could also disrupt AI service integrity and availability if exploited at scale. Organizations in sectors like finance, healthcare, and telecommunications, where sensitive data is frequently processed, are particularly vulnerable. The lack of known exploits currently provides a window for proactive mitigation before widespread attacks occur.

Mitigation Recommendations

To mitigate CVE-2025-63664, organizations should immediately upgrade the GT Edge AI Platform to version 2.0.10-dev or later, where the access control issue is resolved. In parallel, conduct a thorough audit of API access logs to detect any unauthorized access attempts to the /api/v1/conversations/*/messages endpoint. Implement strict role-based access controls (RBAC) and ensure that API endpoints enforce proper authentication and authorization checks. Employ network segmentation and API gateways with rate limiting and anomaly detection to reduce attack surface exposure. Regularly review and update security policies governing AI platform usage and data access. Educate developers and administrators on secure API design and the importance of validating user permissions. If upgrading immediately is not feasible, consider temporarily disabling or restricting access to the vulnerable API endpoints. Finally, prepare incident response plans to quickly address any detected exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69498ef9c525bff625d87af8

Added to database: 12/22/2025, 6:33:29 PM

Last enriched: 12/22/2025, 6:41:15 PM

Last updated: 12/23/2025, 5:55:38 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats