Search criteria
2 vulnerabilities found for com.palantir.acme:dossier-app by Palantir
CVE-2025-62487 (GCVE-0-2025-62487)
Vulnerability from nvd – Published: 2026-01-09 21:17 – Updated: 2026-01-09 21:36
VLAI?
Title
Under certain configurations, file artifacts uploaded to the Dossier and Slides apps did not inherit security markings of their parent artifact. This lack of security markings could lead to unintended access to the uploaded files.
Summary
### Details
On October 1, 2025, Palantir discovered that images uploaded through the Dossier front-end app were not being marked correctly with the proper security levels. The regression was traced back to a change in May 2025, which was meant to allow file uploads to be shared among different artifacts (e.g. other dossiers and presentations).
On deployments configured with CBAC, the front-end would present a security picker dialog to set the security level on the uploads, thereby mitigating the issue.
On deployments without a CBAC configuration, no security picker dialog appears, leading to a security level of CUSTOM with no markings or datasets selected. The resulting markings and groups for the file uploads thus will be only those added by the “Default authorization rules” defined in the Auth Chooser configuration. On most environments, it is expected that the “Default authorization rules" only add the Everyone group.
Severity ?
CWE
- CWE-863 - The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Palantir | com.palantir.acme:gotham-default-apps-bundle |
Unaffected:
100.30251002.0 , < *
(semver)
Unaffected: 100.30250808.87 Unaffected: 100.30250908.1 Affected: 100.30250502.0 , < 100.30251002.0 (semver) Unaffected: 100.30250709.54 Unaffected: 100.30250907.11 Unaffected: 100.30250507.88 Unaffected: 100.30251001.1 Unaffected: * , < 100.30250502.0 (semver) Unaffected: 100.30250906.52 |
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-62487",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-01-09T21:36:19.288885Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-01-09T21:36:29.093Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "com.palantir.acme:gotham-default-apps-bundle",
"vendor": "Palantir",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "100.30251002.0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "100.30250808.87"
},
{
"status": "unaffected",
"version": "100.30250908.1"
},
{
"lessThan": "100.30251002.0",
"status": "affected",
"version": "100.30250502.0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "100.30250709.54"
},
{
"status": "unaffected",
"version": "100.30250907.11"
},
{
"status": "unaffected",
"version": "100.30250507.88"
},
{
"status": "unaffected",
"version": "100.30251001.1"
},
{
"lessThan": "100.30250502.0",
"status": "unaffected",
"version": "*",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "100.30250906.52"
}
]
},
{
"product": "com.palantir.acme:stencil-app-bundle",
"vendor": "Palantir",
"versions": [
{
"status": "unaffected",
"version": "100.30250907.11"
},
{
"status": "unaffected",
"version": "100.30250507.88"
},
{
"status": "unaffected",
"version": "100.30250908.1"
},
{
"status": "unaffected",
"version": "100.30250808.87"
},
{
"lessThan": "*",
"status": "unaffected",
"version": "100.30251002.0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "100.30251001.1"
},
{
"lessThan": "100.30250502.0",
"status": "unaffected",
"version": "*",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "100.30250906.52"
},
{
"lessThan": "100.30251002.0",
"status": "affected",
"version": "100.30250502.0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "100.30250709.54"
}
]
},
{
"product": "com.palantir.acme:dossier-app",
"vendor": "Palantir",
"versions": [
{
"status": "unaffected",
"version": "100.30250907.11"
},
{
"lessThan": "100.30251002.0",
"status": "affected",
"version": "100.30250502.0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "100.30251001.1"
},
{
"status": "unaffected",
"version": "100.30250808.87"
},
{
"lessThan": "100.30250502.0",
"status": "unaffected",
"version": "*",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "100.30250908.1"
},
{
"status": "unaffected",
"version": "100.30250709.54"
},
{
"lessThan": "*",
"status": "unaffected",
"version": "100.30251002.0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "100.30250507.88"
},
{
"status": "unaffected",
"version": "100.30250906.52"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "### Details\nOn October 1, 2025, Palantir discovered that images uploaded through the Dossier front-end app were not being marked correctly with the proper security levels. The regression was traced back to a change in May 2025, which was meant to allow file uploads to be shared among different artifacts (e.g. other dossiers and presentations).\n\nOn deployments configured with CBAC, the front-end would present a security picker dialog to set the security level on the uploads, thereby mitigating the issue.\n\nOn deployments without a CBAC configuration, no security picker dialog appears, leading to a security level of CUSTOM with no markings or datasets selected. The resulting markings and groups for the file uploads thus will be only those added by the \u201cDefault authorization rules\u201d defined in the Auth Chooser configuration. On most environments, it is expected that the \u201cDefault authorization rules\" only add the Everyone group."
}
],
"impacts": [
{
"capecId": "CAPEC-180",
"descriptions": [
{
"lang": "en",
"value": "An attacker exploits a weakness in the configuration of access controls and is able to bypass the intended protection that these measures guard against and thereby obtain unauthorized access to the system or network. Sensitive functionality should always be protected with access controls. However configuring all but the most trivial access control systems can be very complicated and there are many opportunities for mistakes. If an attacker can learn of incorrectly configured access security settings, they may be able to exploit this in an attack."
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N/CR:H/IR:H/AR:H",
"version": "3.1"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-863",
"description": "The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-09T21:17:37.023Z",
"orgId": "bbcbe11d-db20-4bc2-8a6e-c79f87041fd4",
"shortName": "Palantir"
},
"references": [
{
"url": "https://palantir.safebase.us/?tcuUid=c91a1b4f-72e7-4959-9e2d-3a341e5c7a1f"
}
],
"source": {
"defect": [
"PLTRSEC-2025-49"
],
"discovery": "INTERNAL"
},
"title": "Under certain configurations, file artifacts uploaded to the Dossier and Slides apps did not inherit security markings of their parent artifact. This lack of security markings could lead to unintended access to the uploaded files."
}
},
"cveMetadata": {
"assignerOrgId": "bbcbe11d-db20-4bc2-8a6e-c79f87041fd4",
"assignerShortName": "Palantir",
"cveId": "CVE-2025-62487",
"datePublished": "2026-01-09T21:17:37.023Z",
"dateReserved": "2025-10-15T00:02:28.438Z",
"dateUpdated": "2026-01-09T21:36:29.093Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-62487 (GCVE-0-2025-62487)
Vulnerability from cvelistv5 – Published: 2026-01-09 21:17 – Updated: 2026-01-09 21:36
VLAI?
Title
Under certain configurations, file artifacts uploaded to the Dossier and Slides apps did not inherit security markings of their parent artifact. This lack of security markings could lead to unintended access to the uploaded files.
Summary
### Details
On October 1, 2025, Palantir discovered that images uploaded through the Dossier front-end app were not being marked correctly with the proper security levels. The regression was traced back to a change in May 2025, which was meant to allow file uploads to be shared among different artifacts (e.g. other dossiers and presentations).
On deployments configured with CBAC, the front-end would present a security picker dialog to set the security level on the uploads, thereby mitigating the issue.
On deployments without a CBAC configuration, no security picker dialog appears, leading to a security level of CUSTOM with no markings or datasets selected. The resulting markings and groups for the file uploads thus will be only those added by the “Default authorization rules” defined in the Auth Chooser configuration. On most environments, it is expected that the “Default authorization rules" only add the Everyone group.
Severity ?
CWE
- CWE-863 - The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Palantir | com.palantir.acme:gotham-default-apps-bundle |
Unaffected:
100.30251002.0 , < *
(semver)
Unaffected: 100.30250808.87 Unaffected: 100.30250908.1 Affected: 100.30250502.0 , < 100.30251002.0 (semver) Unaffected: 100.30250709.54 Unaffected: 100.30250907.11 Unaffected: 100.30250507.88 Unaffected: 100.30251001.1 Unaffected: * , < 100.30250502.0 (semver) Unaffected: 100.30250906.52 |
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-62487",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-01-09T21:36:19.288885Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-01-09T21:36:29.093Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "com.palantir.acme:gotham-default-apps-bundle",
"vendor": "Palantir",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "100.30251002.0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "100.30250808.87"
},
{
"status": "unaffected",
"version": "100.30250908.1"
},
{
"lessThan": "100.30251002.0",
"status": "affected",
"version": "100.30250502.0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "100.30250709.54"
},
{
"status": "unaffected",
"version": "100.30250907.11"
},
{
"status": "unaffected",
"version": "100.30250507.88"
},
{
"status": "unaffected",
"version": "100.30251001.1"
},
{
"lessThan": "100.30250502.0",
"status": "unaffected",
"version": "*",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "100.30250906.52"
}
]
},
{
"product": "com.palantir.acme:stencil-app-bundle",
"vendor": "Palantir",
"versions": [
{
"status": "unaffected",
"version": "100.30250907.11"
},
{
"status": "unaffected",
"version": "100.30250507.88"
},
{
"status": "unaffected",
"version": "100.30250908.1"
},
{
"status": "unaffected",
"version": "100.30250808.87"
},
{
"lessThan": "*",
"status": "unaffected",
"version": "100.30251002.0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "100.30251001.1"
},
{
"lessThan": "100.30250502.0",
"status": "unaffected",
"version": "*",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "100.30250906.52"
},
{
"lessThan": "100.30251002.0",
"status": "affected",
"version": "100.30250502.0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "100.30250709.54"
}
]
},
{
"product": "com.palantir.acme:dossier-app",
"vendor": "Palantir",
"versions": [
{
"status": "unaffected",
"version": "100.30250907.11"
},
{
"lessThan": "100.30251002.0",
"status": "affected",
"version": "100.30250502.0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "100.30251001.1"
},
{
"status": "unaffected",
"version": "100.30250808.87"
},
{
"lessThan": "100.30250502.0",
"status": "unaffected",
"version": "*",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "100.30250908.1"
},
{
"status": "unaffected",
"version": "100.30250709.54"
},
{
"lessThan": "*",
"status": "unaffected",
"version": "100.30251002.0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "100.30250507.88"
},
{
"status": "unaffected",
"version": "100.30250906.52"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "### Details\nOn October 1, 2025, Palantir discovered that images uploaded through the Dossier front-end app were not being marked correctly with the proper security levels. The regression was traced back to a change in May 2025, which was meant to allow file uploads to be shared among different artifacts (e.g. other dossiers and presentations).\n\nOn deployments configured with CBAC, the front-end would present a security picker dialog to set the security level on the uploads, thereby mitigating the issue.\n\nOn deployments without a CBAC configuration, no security picker dialog appears, leading to a security level of CUSTOM with no markings or datasets selected. The resulting markings and groups for the file uploads thus will be only those added by the \u201cDefault authorization rules\u201d defined in the Auth Chooser configuration. On most environments, it is expected that the \u201cDefault authorization rules\" only add the Everyone group."
}
],
"impacts": [
{
"capecId": "CAPEC-180",
"descriptions": [
{
"lang": "en",
"value": "An attacker exploits a weakness in the configuration of access controls and is able to bypass the intended protection that these measures guard against and thereby obtain unauthorized access to the system or network. Sensitive functionality should always be protected with access controls. However configuring all but the most trivial access control systems can be very complicated and there are many opportunities for mistakes. If an attacker can learn of incorrectly configured access security settings, they may be able to exploit this in an attack."
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N/CR:H/IR:H/AR:H",
"version": "3.1"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-863",
"description": "The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-09T21:17:37.023Z",
"orgId": "bbcbe11d-db20-4bc2-8a6e-c79f87041fd4",
"shortName": "Palantir"
},
"references": [
{
"url": "https://palantir.safebase.us/?tcuUid=c91a1b4f-72e7-4959-9e2d-3a341e5c7a1f"
}
],
"source": {
"defect": [
"PLTRSEC-2025-49"
],
"discovery": "INTERNAL"
},
"title": "Under certain configurations, file artifacts uploaded to the Dossier and Slides apps did not inherit security markings of their parent artifact. This lack of security markings could lead to unintended access to the uploaded files."
}
},
"cveMetadata": {
"assignerOrgId": "bbcbe11d-db20-4bc2-8a6e-c79f87041fd4",
"assignerShortName": "Palantir",
"cveId": "CVE-2025-62487",
"datePublished": "2026-01-09T21:17:37.023Z",
"dateReserved": "2025-10-15T00:02:28.438Z",
"dateUpdated": "2026-01-09T21:36:29.093Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}