Home

Description

A hard-coded, non-random password for the object store (minio) of KNIME Business Hub in all versions except the ones listed below allows an unauthenticated remote attacker in possession of the password to read and manipulate swapped jobs or read and manipulate in- and output data of active jobs. It is also possible to cause a denial-of-service of most functionality of KNIME Business Hub by writing large amounts of data to the object store directly. There are no viable workarounds therefore we strongly recommend to update to one of the following versions of KNIME Business Hub: * 1.13.2 or later * 1.12.3 or later * 1.11.3 or later * 1.10.3 or later

PUBLISHED Reserved 2025-03-17 | Published 2025-03-31 | Updated 2025-03-31 | Assigner KNIME




HIGH: 8.8CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:L/SI:L/SA:N/AU:Y/R:U/V:C/RE:M/U:Amber

Problem types

CWE-259

Product status

Default status
unaffected

1.13.0 (semver) before 1.13.2
affected

1.12.0 (semver) before 1.12.3
affected

1.11.0 (semver) before 1.11.3
affected

Any version before 1.10.3
affected

References

github.com/advisories/GHSA-v5p7-3387-gpmg third-party-advisory

www.knime.com/security/advisories

cve.org (CVE-2025-2402)

nvd.nist.gov (CVE-2025-2402)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.