Vulnerability Description
When processing API requests, the Alteryx server 2022.1.1.42654 and 2024.1 used MongoDB object IDs to uniquely identify the data being requested by the caller. The Alteryx server did not check whether the authenticated user had permission to access the specified MongoDB object ID. By specifying particlar MongoDB object IDs, callers could obtain records for other users without proper authorization. Records retrievable using this attack included administrative API keys and private studio api keys.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Alteryx | Alteryx Server | >= 2022.1.0, <= 2022.1.1.42654 |
Related Weaknesses (CWE)
References
- https://aleksazatezalo.medium.com/alteryx-server-idor-advisory-782e3013ee38ExploitThird Party Advisory
- https://help.alteryx.com/current/en/server/api-overview.htmlProduct
- https://help.alteryx.com/current/en/server/api-overview/alteryx-server-api-v3/seProduct
FAQ
What is CVE-2025-63291?
CVE-2025-63291 is a vulnerability with a CVSS score of 5.4 (MEDIUM). When processing API requests, the Alteryx server 2022.1.1.42654 and 2024.1 used MongoDB object IDs to uniquely identify the data being requested by the caller. The Alteryx server did not check whether...
How severe is CVE-2025-63291?
CVE-2025-63291 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-63291?
Check the references section above for vendor advisories and patch information. Affected products include: Alteryx Alteryx Server.