CVE-2025-63665
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-19

Last updated on: 2025-12-19

Assigner: MITRE

Description
An issue in GT Edge AI Platform Versions before v2.0.10-dev allows attackers to execute arbitrary code via injecting a crafted JSON payload into the Prompt window.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-19
Last Modified
2025-12-19
Generated
2026-05-07
AI Q&A
2025-12-19
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
gt_edge_ai platform 2.0.12
gt_edge_ai platform *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-94 The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-63665 is a vulnerability in GT Edge AI Platform versions before v2.0.12 that allows remote attackers to execute arbitrary code by injecting a crafted JSON payload into the Prompt window, specifically the /chat module. The injected JSON is rendered by the application layer for a large language model (LLM) agent, which leads to execution of attacker-controlled code and leakage of sensitive information such as system prompts and previous chat history. This vulnerability is classified as CWE-94, indicating improper control of code generation. [2]


How can this vulnerability impact me? :

This vulnerability can allow attackers to execute arbitrary code remotely on the affected system, potentially taking full control of the GT Edge AI Platform environment. Additionally, it can lead to leakage of sensitive information including system prompts and chat history, which may compromise confidentiality and integrity of data processed by the platform. [2]


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update the GT Edge AI Platform to version 2.0.12 or later, as versions prior to v2.0.12 are affected. Avoid injecting untrusted JSON payloads into the Prompt window, and restrict access to the /chat module to trusted users only. [2]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows attackers to execute arbitrary code and causes leakage of sensitive information such as system prompts and previous chat history. This information disclosure could lead to violations of data protection regulations like GDPR and HIPAA, which require safeguarding personal and sensitive data. Therefore, exploitation of this vulnerability may result in non-compliance with such standards due to unauthorized access and potential exposure of protected information. [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart