CVE-2025-63663
GT · GT Edge AI Platform
A high-severity vulnerability has been identified in the GT Edge AI Platform, which could allow an authenticated attacker to gain unauthorized access to sensitive files.
Executive summary
A high-severity vulnerability has been identified in the GT Edge AI Platform, which could allow an authenticated attacker to gain unauthorized access to sensitive files. The flaw stems from an improper access control check in a specific API endpoint, potentially leading to a significant data breach, exposure of confidential conversations, and intellectual property theft. Organizations are urged to apply the vendor-provided security update immediately to mitigate this risk.
Vulnerability
The vulnerability is an incorrect access control flaw, also known as a Broken Object Level Authorization (BOLA), in the /api/v1/conversations/*/files API endpoint. An authenticated user, even with low privileges, can manipulate the conversation ID in the API request to access files associated with conversations they do not own. The application fails to properly verify that the user making the request is authorized to access the specified conversation's data, allowing an attacker to systematically enumerate conversation IDs and exfiltrate any attached files.
Business impact
This vulnerability is rated as High severity with a CVSS score of 7.5. Exploitation could lead to a significant breach of confidentiality. An attacker could access sensitive information contained within private conversations and their associated files, including intellectual property, personally identifiable information (PII), financial data, or strategic plans. The consequences of such a breach include severe reputational damage, loss of customer trust, competitive disadvantage, and potential legal and regulatory penalties under data protection laws.
Remediation
Immediate Action: The primary remediation is to upgrade all instances of the GT Edge AI Platform to version 2 or later, as recommended by the vendor. This patch corrects the access control logic to ensure users can only access files from conversations they are authorized to view. After patching, review access logs for any signs of prior exploitation.
Proactive Monitoring: Security teams should actively monitor API logs for suspicious activity targeting the /api/v1/conversations/*/files endpoint. Indicators of compromise include a single user account or IP address making numerous requests to this endpoint with different conversation IDs in a short period. Configure alerts for high-volume data egress from the platform that deviates from established baselines.
Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) or an API security gateway rule to block or rate-limit requests that exhibit enumeration patterns against the vulnerable endpoint. Enforce stricter network segmentation to limit access to the platform's API from untrusted networks until the patch can be applied.
Exploitation status
Public Exploit Available: False
Analyst recommendation
Given the high severity (CVSS 7.5) and the straightforward nature of exploitation, we strongly recommend that organizations prioritize the immediate application of the vendor-supplied security update. Although this vulnerability is not currently listed on the CISA KEV catalog, its potential for significant data exfiltration presents a critical risk. All affected instances of the GT Edge AI Platform should be patched or have compensating controls applied without delay to prevent a potential data breach.