CVE-2025-69207: CWE-639: Authorization Bypass Through User-Controlled Key in khoj-ai khoj
CVE-2025-69207 is an authorization bypass vulnerability in khoj-ai's self-hosted AI app prior to version 2. 0. 0-beta. 23. The flaw is an Insecure Direct Object Reference (IDOR) in the Notion OAuth callback endpoint, allowing attackers to hijack any user's Notion integration by manipulating the state parameter. Exploitation requires knowledge of the victim's UUID, which can be leaked through shared conversations containing AI-generated images. Successful exploitation enables attackers to replace victims' Notion configurations with their own, causing data poisoning and unauthorized access to the victim's Khoj search index. The vulnerability has a CVSS score of 5. 4 (medium severity) and does not require privileges but does require user interaction. No known exploits are currently in the wild.
AI Analysis
Technical Summary
Khoj-ai's khoj application integrates with Notion via OAuth to enable AI-powered search capabilities. Prior to version 2.0.0-beta.23, the OAuth callback endpoint suffers from an Insecure Direct Object Reference (IDOR) vulnerability (CWE-639). Specifically, the callback accepts a user UUID in the state parameter without verifying that the OAuth flow was legitimately initiated by that user. This lack of proper authorization checks allows an attacker who knows a victim's UUID to hijack the victim's Notion integration by manipulating the OAuth callback state parameter. The UUID can be leaked through shared conversations where AI-generated images embed or reveal this identifier. By hijacking the integration, attackers can replace the victim's Notion configuration with their own, leading to data poisoning of the victim's Khoj search index and unauthorized access to sensitive data indexed by Khoj. The vulnerability is remotely exploitable over the network with no privileges required but does require user interaction (the victim completing an OAuth flow). The flaw impacts confidentiality and availability by enabling unauthorized access and data manipulation. The vendor fixed this issue in version 2.0.0-beta.23. No public exploits have been reported to date.
Potential Impact
For European organizations using khoj-ai's khoj application integrated with Notion, this vulnerability poses a risk of unauthorized access to sensitive internal data indexed by Khoj. Attackers could manipulate or poison search indexes, leading to misinformation or exposure of confidential information. This could disrupt business operations relying on accurate AI search results and potentially leak intellectual property or personal data. Since the attack requires knowledge of user UUIDs, organizations that share AI-generated content publicly or internally without proper controls risk leaking these identifiers. The impact extends to data integrity and availability, as poisoned data could degrade trust in AI-driven workflows. Given the medium CVSS score, the threat is moderate but significant for organizations relying heavily on Khoj for knowledge management. The lack of known exploits suggests limited current risk, but the vulnerability should be addressed promptly to prevent future attacks.
Mitigation Recommendations
European organizations should immediately upgrade khoj to version 2.0.0-beta.23 or later where the vulnerability is fixed. Until upgrading, restrict access to the OAuth callback endpoint and monitor logs for suspicious manipulation of the state parameter. Implement strict controls on sharing AI-generated content that may leak user UUIDs, including sanitizing or anonymizing shared data. Employ network segmentation and access controls to limit exposure of the Khoj application to trusted users only. Conduct regular audits of OAuth integrations and verify that authorization flows properly validate user identity. Educate users about the risks of sharing AI-generated images or conversations that might reveal sensitive identifiers. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block unusual OAuth callback requests. Finally, maintain an incident response plan to quickly address any signs of compromise related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Denmark
CVE-2025-69207: CWE-639: Authorization Bypass Through User-Controlled Key in khoj-ai khoj
Description
CVE-2025-69207 is an authorization bypass vulnerability in khoj-ai's self-hosted AI app prior to version 2. 0. 0-beta. 23. The flaw is an Insecure Direct Object Reference (IDOR) in the Notion OAuth callback endpoint, allowing attackers to hijack any user's Notion integration by manipulating the state parameter. Exploitation requires knowledge of the victim's UUID, which can be leaked through shared conversations containing AI-generated images. Successful exploitation enables attackers to replace victims' Notion configurations with their own, causing data poisoning and unauthorized access to the victim's Khoj search index. The vulnerability has a CVSS score of 5. 4 (medium severity) and does not require privileges but does require user interaction. No known exploits are currently in the wild.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Khoj-ai's khoj application integrates with Notion via OAuth to enable AI-powered search capabilities. Prior to version 2.0.0-beta.23, the OAuth callback endpoint suffers from an Insecure Direct Object Reference (IDOR) vulnerability (CWE-639). Specifically, the callback accepts a user UUID in the state parameter without verifying that the OAuth flow was legitimately initiated by that user. This lack of proper authorization checks allows an attacker who knows a victim's UUID to hijack the victim's Notion integration by manipulating the OAuth callback state parameter. The UUID can be leaked through shared conversations where AI-generated images embed or reveal this identifier. By hijacking the integration, attackers can replace the victim's Notion configuration with their own, leading to data poisoning of the victim's Khoj search index and unauthorized access to sensitive data indexed by Khoj. The vulnerability is remotely exploitable over the network with no privileges required but does require user interaction (the victim completing an OAuth flow). The flaw impacts confidentiality and availability by enabling unauthorized access and data manipulation. The vendor fixed this issue in version 2.0.0-beta.23. No public exploits have been reported to date.
Potential Impact
For European organizations using khoj-ai's khoj application integrated with Notion, this vulnerability poses a risk of unauthorized access to sensitive internal data indexed by Khoj. Attackers could manipulate or poison search indexes, leading to misinformation or exposure of confidential information. This could disrupt business operations relying on accurate AI search results and potentially leak intellectual property or personal data. Since the attack requires knowledge of user UUIDs, organizations that share AI-generated content publicly or internally without proper controls risk leaking these identifiers. The impact extends to data integrity and availability, as poisoned data could degrade trust in AI-driven workflows. Given the medium CVSS score, the threat is moderate but significant for organizations relying heavily on Khoj for knowledge management. The lack of known exploits suggests limited current risk, but the vulnerability should be addressed promptly to prevent future attacks.
Mitigation Recommendations
European organizations should immediately upgrade khoj to version 2.0.0-beta.23 or later where the vulnerability is fixed. Until upgrading, restrict access to the OAuth callback endpoint and monitor logs for suspicious manipulation of the state parameter. Implement strict controls on sharing AI-generated content that may leak user UUIDs, including sanitizing or anonymizing shared data. Employ network segmentation and access controls to limit exposure of the Khoj application to trusted users only. Conduct regular audits of OAuth integrations and verify that authorization flows properly validate user identity. Educate users about the risks of sharing AI-generated images or conversations that might reveal sensitive identifiers. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block unusual OAuth callback requests. Finally, maintain an incident response plan to quickly address any signs of compromise related to this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-29T14:54:59.520Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69813002f9fa50a62f63a053
Added to database: 2/2/2026, 11:15:14 PM
Last enriched: 2/10/2026, 11:06:09 AM
Last updated: 3/25/2026, 1:29:25 AM
Views: 84
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.