CVE-2025-15097

medium

Description

A vulnerability was found in Alteryx Server. Affected by this issue is some unknown functionality of the file /gallery/api/status/. Performing manipulation results in improper authentication. The attack is possible to be carried out remotely. The exploit has been made public and could be used. Upgrading to version 2023.1.1.13.486, 2023.2.1.10.293, 2024.1.1.9.236, 2024.2.1.6.125 and 2025.1.1.1.31 can resolve this issue. Upgrading the affected component is recommended.

References

https://vuldb.com/?submit.710169

https://vuldb.com/?id.338428

https://vuldb.com/?ctiid.338428

https://ict-strypes.eu/wp-content/uploads/2025/12/Alteryx-Second-Research.pdf

https://help.alteryx.com/release-notes/en/release-notes/server-release-notes/server-2025-1-release-notes.html

https://gist.github.com/apostolovd/f84631eed2f0c0e83e2e174b1480f08c

Details

Source: Mitre, NVD

Published: 2025-12-26

Updated: 2025-12-26

Risk Information

CVSS v2

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Severity: High

CVSS v3

Base Score: 7.3

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Severity: High

CVSS v4

Base Score: 6.9

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

Severity: Medium

EPSS

EPSS: 0.00098