Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69207: CWE-639: Authorization Bypass Through User-Controlled Key in khoj-ai khoj

0
Medium
VulnerabilityCVE-2025-69207cvecve-2025-69207cwe-639
Published: Mon Feb 02 2026 (02/02/2026, 21:16:49 UTC)
Source: CVE Database V5
Vendor/Project: khoj-ai
Product: khoj

Description

Khoj is a self-hostable artificial intelligence app. Prior to 2.0.0-beta.23, an IDOR in the Notion OAuth callback allows an attacker to hijack any user's Notion integration by manipulating the state parameter. The callback endpoint accepts any user UUID without verifying the OAuth flow was initiated by that user, allowing attackers to replace victims' Notion configurations with their own, resulting in data poisoning and unauthorized access to the victim's Khoj search index. This attack requires knowing the user's UUID which can be leaked through shared conversations where an AI generated image is present. This vulnerability is fixed in 2.0.0-beta.23.

AI-Powered Analysis

AILast updated: 02/02/2026, 23:46:25 UTC

Technical Analysis

Khoj-ai's khoj is a self-hostable AI application that integrates with Notion via OAuth. Versions prior to 2.0.0-beta.23 contain an authorization bypass vulnerability (CVE-2025-69207) classified as CWE-639 (Authorization Bypass Through User-Controlled Key). The flaw exists in the Notion OAuth callback endpoint, which improperly validates the 'state' parameter and accepts any user UUID without verifying that the OAuth flow was initiated by that user. This allows an attacker who knows a victim's UUID to manipulate the OAuth callback, hijacking the victim's Notion integration. The UUID can be leaked through shared conversations containing AI-generated images, which expose the identifier. By hijacking the integration, attackers can replace the victim's Notion configuration with their own, resulting in data poisoning and unauthorized access to the victim's Khoj search index. The vulnerability does not impact confidentiality directly but affects integrity and availability of the victim's indexed data. Exploitation requires no privileges but does require user interaction during the OAuth process. The vulnerability is fixed in khoj version 2.0.0-beta.23. No known exploits are reported in the wild as of the publication date.

Potential Impact

For European organizations using khoj versions prior to 2.0.0-beta.23 with Notion integrations, this vulnerability poses a risk of unauthorized modification of their Notion configurations and poisoning of their AI search indexes. This can lead to corrupted or manipulated search results, undermining data integrity and trust in AI-driven insights. Although confidentiality is not directly compromised, the integrity and availability of critical indexed data can be severely impacted, potentially disrupting workflows that rely on accurate AI search functionality. Organizations handling sensitive or regulated data may face compliance risks if data poisoning leads to incorrect or misleading information being surfaced. The requirement for user interaction and knowledge of UUIDs somewhat limits the attack surface, but UUID leakage via shared AI-generated images increases exposure. This threat is particularly relevant for organizations leveraging khoj for knowledge management and AI-assisted workflows integrated with Notion.

Mitigation Recommendations

European organizations should immediately upgrade all khoj instances to version 2.0.0-beta.23 or later to remediate this vulnerability. Additionally, organizations should audit shared content, especially AI-generated images in conversations, to identify and limit UUID exposure. Implement strict access controls and monitoring on the OAuth callback endpoints to detect unusual or unauthorized OAuth flows. Employ network-level protections such as Web Application Firewalls (WAFs) to detect and block suspicious manipulation of OAuth parameters. Educate users on the risks of sharing AI-generated content that may leak sensitive identifiers. Regularly review and rotate OAuth credentials and tokens to limit the impact of potential hijacking. Finally, conduct penetration testing focused on OAuth flows and IDOR vulnerabilities to proactively identify similar weaknesses.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-29T14:54:59.520Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69813002f9fa50a62f63a053

Added to database: 2/2/2026, 11:15:14 PM

Last enriched: 2/2/2026, 11:46:25 PM

Last updated: 2/6/2026, 12:10:49 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats