Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 29 Dec 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Alteryx
Alteryx alteryx Server |
|
| Vendors & Products |
Alteryx
Alteryx alteryx Server |
Fri, 26 Dec 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 26 Dec 2025 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in Alteryx Server. Affected by this issue is some unknown functionality of the file /gallery/api/status/. Performing manipulation results in improper authentication. The attack is possible to be carried out remotely. The exploit has been made public and could be used. Upgrading to version 2023.1.1.13.486, 2023.2.1.10.293, 2024.1.1.9.236, 2024.2.1.6.125 and 2025.1.1.1.31 can resolve this issue. Upgrading the affected component is recommended. | |
| Title | Alteryx Server status improper authentication | |
| Weaknesses | CWE-287 | |
| References |
|
|
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-12-26T19:30:52.340Z
Reserved: 2025-12-25T15:16:00.965Z
Link: CVE-2025-15097
Updated: 2025-12-26T19:30:49.613Z
Status : Awaiting Analysis
Published: 2025-12-26T03:15:50.273
Modified: 2025-12-29T15:57:37.560
Link: CVE-2025-15097
No data.
OpenCVE Enrichment
Updated: 2025-12-29T23:04:16Z