Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69207: CWE-639: Authorization Bypass Through User-Controlled Key in khoj-ai khoj

0
Medium
VulnerabilityCVE-2025-69207cvecve-2025-69207cwe-639
Published: Mon Feb 02 2026 (02/02/2026, 21:16:49 UTC)
Source: CVE Database V5
Vendor/Project: khoj-ai
Product: khoj

Description

CVE-2025-69207 is an authorization bypass vulnerability in khoj-ai's self-hosted AI app prior to version 2. 0. 0-beta. 23. The flaw is an Insecure Direct Object Reference (IDOR) in the Notion OAuth callback endpoint, allowing attackers to hijack any user's Notion integration by manipulating the state parameter. Exploitation requires knowledge of the victim's UUID, which can be leaked through shared conversations containing AI-generated images. Successful exploitation enables attackers to replace victims' Notion configurations with their own, causing data poisoning and unauthorized access to the victim's Khoj search index. The vulnerability has a CVSS score of 5. 4 (medium severity) and does not require privileges but does require user interaction. No known exploits are currently in the wild.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/10/2026, 11:06:09 UTC

Technical Analysis

Khoj-ai's khoj application integrates with Notion via OAuth to enable AI-powered search capabilities. Prior to version 2.0.0-beta.23, the OAuth callback endpoint suffers from an Insecure Direct Object Reference (IDOR) vulnerability (CWE-639). Specifically, the callback accepts a user UUID in the state parameter without verifying that the OAuth flow was legitimately initiated by that user. This lack of proper authorization checks allows an attacker who knows a victim's UUID to hijack the victim's Notion integration by manipulating the OAuth callback state parameter. The UUID can be leaked through shared conversations where AI-generated images embed or reveal this identifier. By hijacking the integration, attackers can replace the victim's Notion configuration with their own, leading to data poisoning of the victim's Khoj search index and unauthorized access to sensitive data indexed by Khoj. The vulnerability is remotely exploitable over the network with no privileges required but does require user interaction (the victim completing an OAuth flow). The flaw impacts confidentiality and availability by enabling unauthorized access and data manipulation. The vendor fixed this issue in version 2.0.0-beta.23. No public exploits have been reported to date.

Potential Impact

For European organizations using khoj-ai's khoj application integrated with Notion, this vulnerability poses a risk of unauthorized access to sensitive internal data indexed by Khoj. Attackers could manipulate or poison search indexes, leading to misinformation or exposure of confidential information. This could disrupt business operations relying on accurate AI search results and potentially leak intellectual property or personal data. Since the attack requires knowledge of user UUIDs, organizations that share AI-generated content publicly or internally without proper controls risk leaking these identifiers. The impact extends to data integrity and availability, as poisoned data could degrade trust in AI-driven workflows. Given the medium CVSS score, the threat is moderate but significant for organizations relying heavily on Khoj for knowledge management. The lack of known exploits suggests limited current risk, but the vulnerability should be addressed promptly to prevent future attacks.

Mitigation Recommendations

European organizations should immediately upgrade khoj to version 2.0.0-beta.23 or later where the vulnerability is fixed. Until upgrading, restrict access to the OAuth callback endpoint and monitor logs for suspicious manipulation of the state parameter. Implement strict controls on sharing AI-generated content that may leak user UUIDs, including sanitizing or anonymizing shared data. Employ network segmentation and access controls to limit exposure of the Khoj application to trusted users only. Conduct regular audits of OAuth integrations and verify that authorization flows properly validate user identity. Educate users about the risks of sharing AI-generated images or conversations that might reveal sensitive identifiers. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block unusual OAuth callback requests. Finally, maintain an incident response plan to quickly address any signs of compromise related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-29T14:54:59.520Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69813002f9fa50a62f63a053

Added to database: 2/2/2026, 11:15:14 PM

Last enriched: 2/10/2026, 11:06:09 AM

Last updated: 3/23/2026, 5:04:49 PM

Views: 83

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses