CVE-2025-50708

7.5 HIGH

📋 TL;DR

This vulnerability in Perplexity AI GPT-4 version 2.51.0 allows attackers to extract sensitive information from shared chat URLs by exploiting the token component. Users who share or access chat URLs containing this version are affected, potentially exposing private conversation data.

💻 Affected Systems

Products:
  • Perplexity AI GPT-4
Versions: v.2.51.0
Operating Systems: All platforms running the affected web application
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using the specific vulnerable version with shared chat functionality enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete exposure of sensitive chat data including personal information, proprietary business discussions, or confidential material shared in conversations.

🟠

Likely Case

Unauthorized access to private chat content that was shared via URL, potentially exposing personal or sensitive information.

🟢

If Mitigated

Limited exposure of non-critical chat data with proper access controls and URL expiration policies in place.

🌐 Internet-Facing: HIGH - Shared URLs are typically internet-accessible and can be intercepted or guessed.
🏢 Internal Only: MEDIUM - Internal sharing still poses risk if URLs are intercepted within the network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires access to or ability to guess shared chat URLs, which may be predictable or intercepted.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Monitor Perplexity AI for updates and apply when released.

🔧 Temporary Workarounds

Disable Shared Chat URLs

all

Temporarily disable the chat URL sharing feature to prevent exploitation.

Implement URL Expiration

all

Configure shared URLs to expire after short time periods to limit exposure window.

🧯 If You Can't Patch

  • Implement strict access controls and monitoring for shared chat URLs
  • Educate users about risks of sharing chat URLs and implement data classification policies

🔍 How to Verify

Check if Vulnerable:

Check if running Perplexity AI GPT-4 version 2.51.0 and if chat URL sharing is enabled.

Check Version:

Check application settings or about page for version information

Verify Fix Applied:

Verify version is updated beyond 2.51.0 and test that shared URLs no longer expose sensitive tokens.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to shared chat URLs
  • Multiple failed attempts to access chat URLs

Network Indicators:

  • Unusual traffic to chat URL endpoints
  • Patterns of URL enumeration attempts

SIEM Query:

source="web_logs" AND (url CONTAINS "/chat/" OR url CONTAINS "token=") AND status=200

🔗 References

📤 Share & Export