CVE-2025-62487 PUBLISHED

Under certain configurations, file artifacts uploaded to the Dossier and Slides apps did not inherit security markings of their parent artifact. This lack of security markings could lead to unintended access to the uploaded files.

Assigner: Palantir
Reserved: 15.10.2025 Published: 09.01.2026 Updated: 14.01.2026

On October 1, 2025, Palantir discovered that images uploaded through the Dossier front-end app were not being marked correctly with the proper security levels. The regression was traced back to a change in May 2025, which was meant to allow file uploads to be shared among different artifacts (e.g. other dossiers and presentations).

On deployments configured with CBAC, the front-end would present a security picker dialog to set the security level on the uploads, thereby mitigating the issue.

On deployments without a CBAC configuration, no security picker dialog appears, leading to a security level of CUSTOM with no markings or datasets selected. The resulting markings and groups for the file uploads thus will be only those added by the default authorization rules defined in the Auth Chooser configuration. On most environments, it is expected that the default authorization rules only add the Everyone group.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N/CR:H/IR:H/AR:H
CVSS Score: 3.5

Product Status

Vendor Palantir
Product com.palantir.acme:gotham-default-apps-bundle
Versions
  • unaffected from 100.30251002.0 to * (excl.)
  • Version 100.30250808.87 is unaffected
  • Version 100.30250908.1 is unaffected
  • affected from 100.30250502.0 to 100.30251002.0 (excl.)
  • Version 100.30250709.54 is unaffected
  • Version 100.30250907.11 is unaffected
  • Version 100.30250507.88 is unaffected
  • Version 100.30251001.1 is unaffected
  • unaffected from * to 100.30250502.0 (excl.)
  • Version 100.30250906.52 is unaffected
Vendor Palantir
Product com.palantir.acme:stencil-app-bundle
Versions
  • Version 100.30250907.11 is unaffected
  • Version 100.30250507.88 is unaffected
  • Version 100.30250908.1 is unaffected
  • Version 100.30250808.87 is unaffected
  • unaffected from 100.30251002.0 to * (excl.)
  • Version 100.30251001.1 is unaffected
  • unaffected from * to 100.30250502.0 (excl.)
  • Version 100.30250906.52 is unaffected
  • affected from 100.30250502.0 to 100.30251002.0 (excl.)
  • Version 100.30250709.54 is unaffected
Vendor Palantir
Product com.palantir.acme:dossier-app
Versions
  • Version 100.30250907.11 is unaffected
  • affected from 100.30250502.0 to 100.30251002.0 (excl.)
  • Version 100.30251001.1 is unaffected
  • Version 100.30250808.87 is unaffected
  • unaffected from * to 100.30250502.0 (excl.)
  • Version 100.30250908.1 is unaffected
  • Version 100.30250709.54 is unaffected
  • unaffected from 100.30251002.0 to * (excl.)
  • Version 100.30250507.88 is unaffected
  • Version 100.30250906.52 is unaffected

References

Problem Types

  • The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions. CWE

Impacts

  • An attacker exploits a weakness in the configuration of access controls and is able to bypass the intended protection that these measures guard against and thereby obtain unauthorized access to the system or network. Sensitive functionality should always be protected with access controls. However configuring all but the most trivial access control systems can be very complicated and there are many opportunities for mistakes. If an attacker can learn of incorrectly configured access security settings, they may be able to exploit this in an attack.