CVE-2025-11239

4.3 MEDIUM

📋 TL;DR

This vulnerability in KNIME Business Hub allows unauthorized team members to view sensitive information within jobs, potentially exposing confidential data. It affects all users of KNIME Business Hub versions prior to 1.16.0 where team-based collaboration is enabled. The issue stems from improper access controls on job data.

💻 Affected Systems

Products:
  • KNIME Business Hub
Versions: All versions prior to 1.16.0
Operating Systems: Not OS-specific; affects the KNIME Business Hub application
Default Config Vulnerable: ⚠️ Yes
Notes: This vulnerability is present in default configurations where team collaboration features are used; it does not depend on specific OS or external settings.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive job data, such as proprietary algorithms, input/output datasets, or credentials, is exposed to all team members, leading to data breaches, intellectual property theft, or compliance violations.

🟠

Likely Case

Unauthorized team members inadvertently or intentionally access confidential job details, compromising data privacy and potentially violating internal policies or regulations.

🟢

If Mitigated

With proper access controls or after patching, only job creators can view full job information, limiting exposure to authorized users and maintaining data confidentiality.

🌐 Internet-Facing: LOW, as this vulnerability primarily involves internal team access within the KNIME Business Hub platform, not direct external exploitation over the internet.
🏢 Internal Only: HIGH, because it directly impacts internal users by allowing unauthorized access to sensitive job data within teams, posing a significant insider threat.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW, as exploitation requires only authenticated team member access to view job details, with no advanced techniques needed.

Exploitation is straightforward for authenticated users within a team, but no public proof-of-concept or weaponized exploits have been reported as of the advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.16.0 and later

Vendor Advisory: https://www.knime.com/security/advisories

Restart Required: Yes

Instructions:

1. Backup your KNIME Business Hub configuration and data. 2. Upgrade to version 1.16.0 or later using the official KNIME update process. 3. Restart the KNIME Business Hub service to apply the changes. 4. Verify the upgrade by checking the version in the admin interface.

🔧 Temporary Workarounds

Restrict Team Access

all

Limit team membership to only essential users and review job permissions to reduce exposure of sensitive information.

Use KNIME Business Hub admin tools to audit and adjust team memberships and job access controls.

🧯 If You Can't Patch

  • Audit and monitor job access logs for unauthorized viewing by team members to detect potential misuse.
  • Implement data classification and ensure sensitive information is not stored in jobs accessible to teams; use encryption or separate storage for critical data.

🔍 How to Verify

Check if Vulnerable:

Check the KNIME Business Hub version in the admin interface; if it is below 1.16.0, the system is vulnerable. Test by creating a job with dummy sensitive data and verifying if team members can view it beyond metadata.

Check Version:

Use the KNIME Business Hub admin dashboard or CLI command specific to your deployment (e.g., 'knime version' or check web UI) to display the current version.

Verify Fix Applied:

After upgrading to 1.16.0 or later, confirm that team members can only see job metadata and not full in/out data; test with a sample job and user accounts.

📡 Detection & Monitoring

Log Indicators:

  • Log entries showing unauthorized access attempts to job details by non-creator team members, or audit logs of job data views exceeding metadata access.

Network Indicators:

  • Not applicable, as this is an application-level access control issue without specific network signatures.

SIEM Query:

Example query for SIEM: 'source="knime_logs" AND event_type="job_access" AND user!=creator AND data_viewed="full"'

🔗 References

📤 Share & Export