ServiceNow Patches Critical AI Platform Flaw Allowing Unauthenticated User Impersonation
ServiceNow has disclosed details of a now-patched critical security flaw impacting its ServiceNow artificial intelligence (AI) Platform that could enable an unauthenticated user to impersonate another user and perform arbitrary actions as that user. The vulnerability, tracked as CVE-2025-12420, carries a CVSS score of 9.3 out of 10.0. It has been codenamed BodySnatcher by AppOmni. "This issue [.
AI Analysis
Technical Summary
ServiceNow disclosed a critical security vulnerability identified as CVE-2025-12420 in its AI Platform, specifically impacting Now Assist AI Agents (sn_aia) and Virtual Agent API (sn_va_as_service) components. This flaw allowed unauthenticated attackers to impersonate any user and execute arbitrary actions with the impersonated user's privileges, effectively bypassing authentication controls. The vulnerability scored 9.3/10 on the CVSS scale, reflecting its critical nature. The root cause involved insufficient validation or access control in the AI platform's user impersonation mechanisms, potentially exacerbated by the agentic capabilities of the generative AI features. The flaw was responsibly disclosed by Aaron Costello of AppOmni in October 2025 and patched by ServiceNow by October 30, 2025, with updates released for hosted instances and patches shared with partners and self-hosted customers. Exploitation could enable attackers to exfiltrate sensitive corporate data, modify records, and escalate privileges, posing significant risks to confidentiality, integrity, and availability. This vulnerability follows prior findings where default configurations in ServiceNow's AI platform allowed second-order prompt injection attacks, indicating a broader risk profile in AI-powered SaaS environments. No evidence of exploitation in the wild has been reported yet, but the potential for damage is high given the platform's widespread use in enterprise IT service management and automation.
Potential Impact
For European organizations, the impact of this vulnerability is substantial. ServiceNow is widely adopted across Europe for IT service management, HR workflows, and business process automation, often integrated with sensitive corporate data and critical operational systems. An attacker exploiting this flaw could impersonate privileged users, leading to unauthorized data access, manipulation of business records, disruption of workflows, and potential lateral movement within corporate networks. This could result in data breaches, regulatory non-compliance (e.g., GDPR violations), financial losses, and reputational damage. The AI platform's agentic capabilities increase the risk by enabling automated execution of malicious commands once impersonation is achieved. Organizations in sectors such as finance, healthcare, government, and critical infrastructure are particularly vulnerable due to the sensitivity and regulatory requirements of their data. The lack of required authentication and user interaction lowers the barrier for exploitation, increasing the likelihood of targeted attacks or opportunistic exploitation if patches are not applied promptly.
Mitigation Recommendations
European organizations should immediately verify their ServiceNow AI platform versions and apply the security patches released on or after October 30, 2025, specifically versions 5.1.18 or later and 5.2.19 or later for Now Assist AI Agents, and 3.15.2 or later and 4.0.4 or later for Virtual Agent API. Beyond patching, organizations should audit and harden AI platform configurations to minimize default or overly permissive settings, particularly those enabling agentic AI actions. Implement strict role-based access controls and monitor impersonation or privilege escalation attempts via logging and anomaly detection. Conduct thorough security reviews of AI-driven workflows to identify potential injection or command execution vectors. Engage in continuous threat hunting focused on AI platform logs and unusual user behavior. Coordinate with ServiceNow support and partners to ensure all instances, including self-hosted environments, are updated. Finally, integrate AI platform security into broader SaaS risk management and zero trust strategies to reduce attack surface and improve detection capabilities.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Switzerland, Belgium, Italy, Spain, Ireland
ServiceNow Patches Critical AI Platform Flaw Allowing Unauthenticated User Impersonation
Description
ServiceNow has disclosed details of a now-patched critical security flaw impacting its ServiceNow artificial intelligence (AI) Platform that could enable an unauthenticated user to impersonate another user and perform arbitrary actions as that user. The vulnerability, tracked as CVE-2025-12420, carries a CVSS score of 9.3 out of 10.0. It has been codenamed BodySnatcher by AppOmni. "This issue [.
AI-Powered Analysis
Technical Analysis
ServiceNow disclosed a critical security vulnerability identified as CVE-2025-12420 in its AI Platform, specifically impacting Now Assist AI Agents (sn_aia) and Virtual Agent API (sn_va_as_service) components. This flaw allowed unauthenticated attackers to impersonate any user and execute arbitrary actions with the impersonated user's privileges, effectively bypassing authentication controls. The vulnerability scored 9.3/10 on the CVSS scale, reflecting its critical nature. The root cause involved insufficient validation or access control in the AI platform's user impersonation mechanisms, potentially exacerbated by the agentic capabilities of the generative AI features. The flaw was responsibly disclosed by Aaron Costello of AppOmni in October 2025 and patched by ServiceNow by October 30, 2025, with updates released for hosted instances and patches shared with partners and self-hosted customers. Exploitation could enable attackers to exfiltrate sensitive corporate data, modify records, and escalate privileges, posing significant risks to confidentiality, integrity, and availability. This vulnerability follows prior findings where default configurations in ServiceNow's AI platform allowed second-order prompt injection attacks, indicating a broader risk profile in AI-powered SaaS environments. No evidence of exploitation in the wild has been reported yet, but the potential for damage is high given the platform's widespread use in enterprise IT service management and automation.
Potential Impact
For European organizations, the impact of this vulnerability is substantial. ServiceNow is widely adopted across Europe for IT service management, HR workflows, and business process automation, often integrated with sensitive corporate data and critical operational systems. An attacker exploiting this flaw could impersonate privileged users, leading to unauthorized data access, manipulation of business records, disruption of workflows, and potential lateral movement within corporate networks. This could result in data breaches, regulatory non-compliance (e.g., GDPR violations), financial losses, and reputational damage. The AI platform's agentic capabilities increase the risk by enabling automated execution of malicious commands once impersonation is achieved. Organizations in sectors such as finance, healthcare, government, and critical infrastructure are particularly vulnerable due to the sensitivity and regulatory requirements of their data. The lack of required authentication and user interaction lowers the barrier for exploitation, increasing the likelihood of targeted attacks or opportunistic exploitation if patches are not applied promptly.
Mitigation Recommendations
European organizations should immediately verify their ServiceNow AI platform versions and apply the security patches released on or after October 30, 2025, specifically versions 5.1.18 or later and 5.2.19 or later for Now Assist AI Agents, and 3.15.2 or later and 4.0.4 or later for Virtual Agent API. Beyond patching, organizations should audit and harden AI platform configurations to minimize default or overly permissive settings, particularly those enabling agentic AI actions. Implement strict role-based access controls and monitor impersonation or privilege escalation attempts via logging and anomaly detection. Conduct thorough security reviews of AI-driven workflows to identify potential injection or command execution vectors. Engage in continuous threat hunting focused on AI platform logs and unusual user behavior. Coordinate with ServiceNow support and partners to ensure all instances, including self-hosted environments, are updated. Finally, integrate AI platform security into broader SaaS risk management and zero trust strategies to reduce attack surface and improve detection capabilities.
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2026/01/servicenow-patches-critical-ai-platform.html","fetched":true,"fetchedAt":"2026-01-13T11:55:38.957Z","wordCount":844}
Threat ID: 696632baa60475309fdb65a4
Added to database: 1/13/2026, 11:55:38 AM
Last enriched: 1/13/2026, 11:56:05 AM
Last updated: 2/7/2026, 4:35:30 PM
Views: 247
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
CriticalCVE-2026-25803: CWE-798: Use of Hard-coded Credentials in denpiligrim 3dp-manager
CriticalCVE-2026-25763: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in opf openproject
CriticalCVE-2026-1727: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Google Cloud Gemini Enterprise (formerly Agentspace)
CriticalCVE-2026-1731: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in BeyondTrust Remote Support(RS) & Privileged Remote Access(PRA)
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.