CVE-2025-64400: The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. in Palantir com.palantir.controlpanel:control-panel
CVE-2025-64400 is a medium-severity vulnerability in Palantir's Control Panel product that allows unauthorized actors to pre-register users into organizations without proper access checks. The flaw arises because the API only verifies that the requester has edit permissions on the enrollment-level user directory but fails to confirm that the requester belongs to or has access to the specific organization they are adding users to. This can lead to unauthorized user creation across organizational boundaries, potentially exposing sensitive enrollment data. Exploitation requires network access and privileges to edit the enrollment-level directory but does not require user interaction. While the impact on confidentiality is limited and there is no integrity or availability impact, the vulnerability could facilitate unauthorized access or lateral movement within affected environments. No known exploits are currently in the wild. European organizations using Palantir Control Panel should review and restrict enrollment-level edit permissions and monitor user creation activities. Countries with significant Palantir deployments, such as the UK, Germany, France, and the Netherlands, are most likely to be affected.
AI Analysis
Technical Summary
CVE-2025-64400 is a vulnerability identified in Palantir's Control Panel product, specifically within its API responsible for pre-registering users into enrollments and organizations before their first login. The API enforces a permission check to ensure that the requesting account has 'edit' rights on the enrollment-level user directory. However, it lacks a critical authorization check to verify that the enrollment editor is authorized to add users to the specific organization in question. This missing check allows an actor with enrollment-level edit privileges to create users in organizations they do not belong to or have access to, effectively bypassing organizational boundaries. The vulnerability does not require user interaction and can be exploited remotely over the network by an authenticated user with elevated privileges. The CVSS 3.1 score of 4.1 reflects a medium severity, primarily due to the limited confidentiality impact and absence of integrity or availability impacts. The vulnerability's scope is confined to the Palantir Control Panel product, affecting all versions as indicated. Although no public exploits have been reported, the flaw could be leveraged for unauthorized user provisioning, potentially enabling privilege escalation or lateral movement within an enterprise environment. The vulnerability highlights a common authorization design flaw where hierarchical permission checks do not sufficiently enforce organizational boundaries, underscoring the need for granular access controls in multi-tenant or multi-organization systems.
Potential Impact
For European organizations using Palantir Control Panel, this vulnerability poses a risk of unauthorized user creation across organizational boundaries, which can lead to unauthorized access to sensitive data or systems. While the direct confidentiality impact is limited, the ability to create users in unauthorized organizations could facilitate lateral movement, privilege escalation, or insider threat scenarios. This is particularly concerning for organizations with strict data segregation requirements or those operating in regulated sectors such as finance, healthcare, or government. The vulnerability does not affect system availability or data integrity directly but could undermine trust in access controls and complicate compliance with data protection regulations like GDPR. The medium severity rating suggests that while the risk is not critical, it warrants timely remediation to prevent potential misuse. Organizations with complex multi-organization deployments or shared enrollment directories are at higher risk. The absence of known exploits reduces immediate threat but does not eliminate the need for proactive mitigation.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Audit and restrict enrollment-level user directory edit permissions to only trusted administrators with a clear need, minimizing the number of accounts that can exploit this flaw. 2) Implement compensating controls such as monitoring and alerting on user creation events, especially those that add users to organizations outside the requester's normal scope. 3) Apply network segmentation and access controls to limit which systems and users can access the Control Panel API. 4) Engage with Palantir to obtain and deploy patches or updates addressing this vulnerability as they become available. 5) Conduct regular reviews of user provisioning workflows and permissions to detect anomalies. 6) Consider implementing additional application-layer authorization checks or custom policies that enforce organizational boundaries until an official fix is applied. 7) Train administrators on the risks of excessive permissions and the importance of adhering to the principle of least privilege. These measures go beyond generic advice by focusing on permission hygiene, monitoring, and compensating controls tailored to the specific nature of this vulnerability.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Italy
CVE-2025-64400: The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. in Palantir com.palantir.controlpanel:control-panel
Description
CVE-2025-64400 is a medium-severity vulnerability in Palantir's Control Panel product that allows unauthorized actors to pre-register users into organizations without proper access checks. The flaw arises because the API only verifies that the requester has edit permissions on the enrollment-level user directory but fails to confirm that the requester belongs to or has access to the specific organization they are adding users to. This can lead to unauthorized user creation across organizational boundaries, potentially exposing sensitive enrollment data. Exploitation requires network access and privileges to edit the enrollment-level directory but does not require user interaction. While the impact on confidentiality is limited and there is no integrity or availability impact, the vulnerability could facilitate unauthorized access or lateral movement within affected environments. No known exploits are currently in the wild. European organizations using Palantir Control Panel should review and restrict enrollment-level edit permissions and monitor user creation activities. Countries with significant Palantir deployments, such as the UK, Germany, France, and the Netherlands, are most likely to be affected.
AI-Powered Analysis
Technical Analysis
CVE-2025-64400 is a vulnerability identified in Palantir's Control Panel product, specifically within its API responsible for pre-registering users into enrollments and organizations before their first login. The API enforces a permission check to ensure that the requesting account has 'edit' rights on the enrollment-level user directory. However, it lacks a critical authorization check to verify that the enrollment editor is authorized to add users to the specific organization in question. This missing check allows an actor with enrollment-level edit privileges to create users in organizations they do not belong to or have access to, effectively bypassing organizational boundaries. The vulnerability does not require user interaction and can be exploited remotely over the network by an authenticated user with elevated privileges. The CVSS 3.1 score of 4.1 reflects a medium severity, primarily due to the limited confidentiality impact and absence of integrity or availability impacts. The vulnerability's scope is confined to the Palantir Control Panel product, affecting all versions as indicated. Although no public exploits have been reported, the flaw could be leveraged for unauthorized user provisioning, potentially enabling privilege escalation or lateral movement within an enterprise environment. The vulnerability highlights a common authorization design flaw where hierarchical permission checks do not sufficiently enforce organizational boundaries, underscoring the need for granular access controls in multi-tenant or multi-organization systems.
Potential Impact
For European organizations using Palantir Control Panel, this vulnerability poses a risk of unauthorized user creation across organizational boundaries, which can lead to unauthorized access to sensitive data or systems. While the direct confidentiality impact is limited, the ability to create users in unauthorized organizations could facilitate lateral movement, privilege escalation, or insider threat scenarios. This is particularly concerning for organizations with strict data segregation requirements or those operating in regulated sectors such as finance, healthcare, or government. The vulnerability does not affect system availability or data integrity directly but could undermine trust in access controls and complicate compliance with data protection regulations like GDPR. The medium severity rating suggests that while the risk is not critical, it warrants timely remediation to prevent potential misuse. Organizations with complex multi-organization deployments or shared enrollment directories are at higher risk. The absence of known exploits reduces immediate threat but does not eliminate the need for proactive mitigation.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Audit and restrict enrollment-level user directory edit permissions to only trusted administrators with a clear need, minimizing the number of accounts that can exploit this flaw. 2) Implement compensating controls such as monitoring and alerting on user creation events, especially those that add users to organizations outside the requester's normal scope. 3) Apply network segmentation and access controls to limit which systems and users can access the Control Panel API. 4) Engage with Palantir to obtain and deploy patches or updates addressing this vulnerability as they become available. 5) Conduct regular reviews of user provisioning workflows and permissions to detect anomalies. 6) Consider implementing additional application-layer authorization checks or custom policies that enforce organizational boundaries until an official fix is applied. 7) Train administrators on the risks of excessive permissions and the importance of adhering to the principle of least privilege. These measures go beyond generic advice by focusing on permission hygiene, monitoring, and compensating controls tailored to the specific nature of this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Palantir
- Date Reserved
- 2025-10-31T16:12:53.455Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 694459184eb3efac36a3bd24
Added to database: 12/18/2025, 7:42:16 PM
Last enriched: 12/25/2025, 8:02:52 PM
Last updated: 2/5/2026, 10:56:00 PM
Views: 110
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-24302: CWE-284: Improper Access Control in Microsoft Azure ARC
HighCVE-2026-24300: CWE-284: Improper Access Control in Microsoft Azure Front Door
CriticalCVE-2026-21532: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Azure Functions
HighCVE-2026-0391: CWE-451: User Interface (UI) Misrepresentation of Critical Information in Microsoft Microsoft Edge (Chromium-based)
MediumCVE-2026-1970: Open Redirect in Edimax BR-6258n
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.