CVE-2025-64753: CWE-863: Incorrect Authorization in gristlabs grist-core
grist-core is a spreadsheet hosting server. Prior to version 1.7.7, a user with only partial read access to a document could still access endpoints listing hashes for versions of that document and receive a full list of changes between versions, even if those changes contained cells, columns, or tables to which the user was not supposed to have read access. This was fixed in version 1.7.7 by restricting the `/compare` endpoint to users with full read access. As a workaround, remove sensitive document history using the `/states/remove` endpoint. Another possibility is to block the `/compare` endpoint.
AI Analysis
Technical Summary
CVE-2025-64753 is an incorrect authorization vulnerability (CWE-863) affecting grist-core, a spreadsheet hosting server used for collaborative document management. In versions prior to 1.7.7, users granted only partial read access to a document could still access the /compare API endpoint. This endpoint provides a list of hashes for document versions and detailed diffs of changes between versions. Due to insufficient authorization checks, these users could view changes involving cells, columns, or tables beyond their permitted access scope, leading to unauthorized disclosure of sensitive data. The vulnerability arises because the system did not enforce full read access requirements on the /compare endpoint, allowing privilege escalation in terms of data visibility. The vendor fixed this issue in version 1.7.7 by restricting /compare access strictly to users with full read permissions. As a mitigation, administrators can remove sensitive document history using the /states/remove endpoint or block the /compare endpoint to prevent exploitation. The CVSS 3.1 score of 5.3 reflects a medium severity, with network attack vector, low attack complexity, low privileges required, no user interaction, and a high confidentiality impact but no integrity or availability impact. No public exploits have been reported, but the vulnerability could be leveraged by authenticated users with partial access to gain unauthorized data visibility.
Potential Impact
For European organizations using grist-core, this vulnerability poses a risk of unauthorized disclosure of sensitive spreadsheet data, potentially including confidential business information, financial data, or personal data protected under GDPR. Since the flaw allows users with limited read permissions to access full change histories, it could lead to exposure of information that was intentionally restricted, undermining data confidentiality and trust in document access controls. This could result in compliance violations, reputational damage, and potential legal consequences under European data protection regulations. The impact is particularly significant for sectors handling sensitive or regulated data such as finance, healthcare, legal, and government institutions. However, the vulnerability does not affect data integrity or availability, and exploitation requires at least partial document access, limiting the attack surface. Organizations relying on grist-core for collaborative workflows must assess their exposure and remediate promptly to prevent data leakage.
Mitigation Recommendations
European organizations should immediately upgrade grist-core to version 1.7.7 or later, where the vulnerability is fixed by enforcing full read access on the /compare endpoint. If immediate upgrading is not feasible, administrators should implement the following mitigations: (1) Use the /states/remove endpoint to delete sensitive document history that could be exposed via the /compare endpoint, thereby limiting the amount of sensitive data accessible; (2) Configure access controls or network-level rules to block or restrict access to the /compare endpoint entirely, preventing unauthorized queries; (3) Audit user permissions to ensure that only trusted users have partial or full read access, minimizing the risk of insider threats; (4) Monitor logs for unusual access patterns to the /compare endpoint or document version histories; (5) Educate users about the sensitivity of document version histories and enforce strict access policies. These targeted mitigations go beyond generic advice by focusing on the specific vulnerable endpoint and document history management.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy, Spain
CVE-2025-64753: CWE-863: Incorrect Authorization in gristlabs grist-core
Description
grist-core is a spreadsheet hosting server. Prior to version 1.7.7, a user with only partial read access to a document could still access endpoints listing hashes for versions of that document and receive a full list of changes between versions, even if those changes contained cells, columns, or tables to which the user was not supposed to have read access. This was fixed in version 1.7.7 by restricting the `/compare` endpoint to users with full read access. As a workaround, remove sensitive document history using the `/states/remove` endpoint. Another possibility is to block the `/compare` endpoint.
AI-Powered Analysis
Technical Analysis
CVE-2025-64753 is an incorrect authorization vulnerability (CWE-863) affecting grist-core, a spreadsheet hosting server used for collaborative document management. In versions prior to 1.7.7, users granted only partial read access to a document could still access the /compare API endpoint. This endpoint provides a list of hashes for document versions and detailed diffs of changes between versions. Due to insufficient authorization checks, these users could view changes involving cells, columns, or tables beyond their permitted access scope, leading to unauthorized disclosure of sensitive data. The vulnerability arises because the system did not enforce full read access requirements on the /compare endpoint, allowing privilege escalation in terms of data visibility. The vendor fixed this issue in version 1.7.7 by restricting /compare access strictly to users with full read permissions. As a mitigation, administrators can remove sensitive document history using the /states/remove endpoint or block the /compare endpoint to prevent exploitation. The CVSS 3.1 score of 5.3 reflects a medium severity, with network attack vector, low attack complexity, low privileges required, no user interaction, and a high confidentiality impact but no integrity or availability impact. No public exploits have been reported, but the vulnerability could be leveraged by authenticated users with partial access to gain unauthorized data visibility.
Potential Impact
For European organizations using grist-core, this vulnerability poses a risk of unauthorized disclosure of sensitive spreadsheet data, potentially including confidential business information, financial data, or personal data protected under GDPR. Since the flaw allows users with limited read permissions to access full change histories, it could lead to exposure of information that was intentionally restricted, undermining data confidentiality and trust in document access controls. This could result in compliance violations, reputational damage, and potential legal consequences under European data protection regulations. The impact is particularly significant for sectors handling sensitive or regulated data such as finance, healthcare, legal, and government institutions. However, the vulnerability does not affect data integrity or availability, and exploitation requires at least partial document access, limiting the attack surface. Organizations relying on grist-core for collaborative workflows must assess their exposure and remediate promptly to prevent data leakage.
Mitigation Recommendations
European organizations should immediately upgrade grist-core to version 1.7.7 or later, where the vulnerability is fixed by enforcing full read access on the /compare endpoint. If immediate upgrading is not feasible, administrators should implement the following mitigations: (1) Use the /states/remove endpoint to delete sensitive document history that could be exposed via the /compare endpoint, thereby limiting the amount of sensitive data accessible; (2) Configure access controls or network-level rules to block or restrict access to the /compare endpoint entirely, preventing unauthorized queries; (3) Audit user permissions to ensure that only trusted users have partial or full read access, minimizing the risk of insider threats; (4) Monitor logs for unusual access patterns to the /compare endpoint or document version histories; (5) Educate users about the sensitivity of document version histories and enforce strict access policies. These targeted mitigations go beyond generic advice by focusing on the specific vulnerable endpoint and document history management.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-10T22:29:34.874Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6916529405b975ba759276fe
Added to database: 11/13/2025, 9:50:12 PM
Last enriched: 11/13/2025, 10:05:23 PM
Last updated: 11/14/2025, 4:07:08 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13161: CWE-23 Relative Path Traversal in IQ Service International IQ-Support
HighCVE-2025-13160: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in IQ Service International IQ-Support
MediumCVE-2025-9479: Out of bounds read in Google Chrome
UnknownCVE-2025-13107: Inappropriate implementation in Google Chrome
UnknownCVE-2025-13102: Inappropriate implementation in Google Chrome
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.