CVE-2025-63291

Source
https://cve.org/CVERecord?id=CVE-2025-63291
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-63291.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-63291
Published
2025-11-14T19:16:01.163Z
Modified
2026-03-13T03:40:43.208813Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

When processing API requests, the Alteryx server 2022.1.1.42654 and 2024.1 used MongoDB object IDs to uniquely identify the data being requested by the caller. The Alteryx server did not check whether the authenticated user had permission to access the specified MongoDB object ID. By specifying particlar MongoDB object IDs, callers could obtain records for other users without proper authorization. Records retrievable using this attack included administrative API keys and private studio api keys.

References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-63291.json"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "2022.1.0"
            },
            {
                "last_affected": "2022.1.1.42654"
            }
        ]
    }
]