palantir CVE Vulnerabilities & Metrics

Focus on palantir vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About palantir Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with palantir. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total palantir CVEs: 21
Earliest CVE date: 14 Jun 2022, 14:15 UTC
Latest CVE date: 29 Jan 2024, 19:15 UTC

Latest CVE reference: CVE-2023-30970

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical palantir CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 0.3

Max CVSS: 6.4

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 20
4.0-6.9 1
7.0-8.9 0
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS palantir CVEs

These are the five CVEs with the highest CVSS scores for palantir, sorted by severity first and recency.

All CVEs for palantir

CVE-2023-30970 palantir vulnerability CVSS: 0 29 Jan 2024, 19:15 UTC

Gotham Table service and Forward App were found to be vulnerable to a Path traversal issue allowing an authenticated user to read arbitrary files on the file system.

CVE-2023-30954 palantir vulnerability CVSS: 0 15 Nov 2023, 20:15 UTC

The Gotham video-application-server service contained a race condition which would cause it to not apply certain acls new videos if the source system had not yet initialized.

CVE-2023-30969 palantir vulnerability CVSS: 0 26 Oct 2023, 00:15 UTC

The Palantir Tiles1 service was found to be vulnerable to an API wide issue where the service was not performing authentication/authorization on all the endpoints.

CVE-2023-30967 palantir vulnerability CVSS: 0 26 Oct 2023, 00:15 UTC

Gotham Orbital-Simulator service prior to 0.692.0 was found to be vulnerable to a Path traversal issue allowing an unauthenticated user to read arbitrary files on the file system.

CVE-2023-30961 palantir vulnerability CVSS: 0 27 Sep 2023, 15:18 UTC

Palantir Gotham was found to be vulnerable to a bug where under certain circumstances, the frontend could have applied an incorrect classification to a newly created property or link.

CVE-2023-30959 palantir vulnerability CVSS: 0 27 Sep 2023, 15:18 UTC

In Apollo change requests, comments added by users could contain a javascript URI link that when rendered will result in an XSS that require user interaction.

CVE-2023-30951 palantir vulnerability CVSS: 0 03 Aug 2023, 22:15 UTC

The Foundry Magritte plugin rest-source was found to be vulnerable to an an XML external Entity attack (XXE).

CVE-2023-30950 palantir vulnerability CVSS: 0 03 Aug 2023, 22:15 UTC

The foundry campaigns service was found to be vulnerable to an unauthenticated information disclosure in a rest endpoint

CVE-2023-30949 palantir vulnerability CVSS: 0 26 Jul 2023, 18:15 UTC

A missing origin validation in Slate sandbox could be exploited by a malicious user to modify the page's content, which could lead to phishing attacks.

CVE-2023-30963 palantir vulnerability CVSS: 0 10 Jul 2023, 22:15 UTC

A security defect was discovered in Foundry Frontend which enabled users to perform Stored XSS attacks in Slate if Foundry's CSP were to be bypassed. This defect was resolved with the release of Foundry Frontend 6.229.0. The service was rolled out to all affected Foundry instances. No further intervention is required.

CVE-2023-22835 palantir vulnerability CVSS: 0 10 Jul 2023, 21:15 UTC

A security defect was identified that enabled a user of Foundry Issues to perform a Denial of Service attack by submitting malformed data in an Issue that caused loss of frontend functionality to all issue participants. This defect was resolved with the release of Foundry Issues 2.510.0 and Foundry Frontend 6.228.0.

CVE-2023-30955 palantir vulnerability CVSS: 0 29 Jun 2023, 19:15 UTC

A security defect was identified in Foundry workspace-server that enabled a user to bypass an authorization check and view settings related to 'Developer Mode'. This enabled users with insufficient privilege the ability to view and interact with Developer Mode settings in a limited capacity. A fix was deployed with workspace-server 7.7.0.

CVE-2023-30946 palantir vulnerability CVSS: 0 29 Jun 2023, 19:15 UTC

A security defect was identified in Foundry Issues. If a user was added to an issue on a resource that they did not have access to and consequently could not see, they could query Foundry's Notification API and receive metadata about the issue including the RID of the issue, severity, internal UUID of the author, and the user-defined title of the issue.

CVE-2023-22834 palantir vulnerability CVSS: 0 27 Jun 2023, 00:15 UTC

The Contour Service was not checking that users had permission to create an analysis for a given dataset. This could allow an attacker to clutter up Compass folders with extraneous analyses, that the attacker would otherwise not have permission to create.

CVE-2022-27897 palantir vulnerability CVSS: 0 16 Feb 2023, 16:15 UTC

Palantir Gotham versions prior to 3.22.11.2 included an unauthenticated endpoint that would load portions of maliciously crafted zip files to memory. An attacker could repeatedly upload a malicious zip file, which would allow them to exhaust memory resources on the dispatch server.

CVE-2022-27892 palantir vulnerability CVSS: 0 16 Feb 2023, 16:15 UTC

Palantir Gotham versions prior to 3.22.11.2 included an unauthenticated endpoint that would have allowed an attacker to exhaust the memory of the Gotham dispatch service.

CVE-2022-27891 palantir vulnerability CVSS: 0 16 Feb 2023, 16:15 UTC

Palantir Gotham included an unauthenticated endpoint that listed all active usernames on the stack with an active session. The affected services have been patched and automatically deployed to all Apollo-managed Gotham instances. It is highly recommended that customers upgrade all affected services to the latest version. This issue affects: Palantir Gotham versions prior to 103.30221005.0.

CVE-2022-27890 palantir vulnerability CVSS: 0 16 Feb 2023, 16:15 UTC

It was discovered that the sls-logging was not verifying hostnames in TLS certificates due to a misuse of the javax.net.ssl.SSLSocketFactory API. A malicious attacker in a privileged network position could abuse this to perform a man-in-the-middle attack. A successful man-in-the-middle attack would allow them to intercept, read, or modify network communications to and from the affected service. In the case of AtlasDB, the vulnerability was mitigated by other network controls such as two-way TLS when deployed as part of a Palantir platform. Palantir still recommends upgrading to a non-vulnerable version out of an abundance of caution.

CVE-2022-27895 palantir vulnerability CVSS: 0 15 Nov 2022, 20:15 UTC

Information Exposure Through Log Files vulnerability discovered in Foundry when logs were captured using an underlying library known as Build2. This issue was present in versions earlier than 1.785.0. Upgrade to Build2 version 1.785.0 or greater.

CVE-2022-27896 palantir vulnerability CVSS: 0 14 Nov 2022, 21:15 UTC

Information Exposure Through Log Files vulnerability discovered in Foundry Code-Workbooks where the endpoint backing that console was generating service log records of any Python code being run. These service logs included the Foundry token that represents the Code-Workbooks Python console. Upgrade to Code-Workbooks version 4.461.0. This issue affects Palantir Foundry Code-Workbooks version 4.144 to version 4.460.0 and is resolved in 4.461.0.

CVE-2022-27889 palantir vulnerability CVSS: 6.4 14 Jun 2022, 14:15 UTC

The Multipass service was found to have code paths that could be abused to cause a denial of service for authentication or authorization operations. A malicious attacker could perform an application-level denial of service attack, potentially causing authentication and/or authorization operations to fail for the duration of the attack. This could lead to performance degradation or login failures for customer Palantir Foundry environments. This vulnerability is resolved in Multipass 3.647.0. This issue affects: Palantir Foundry Multipass versions prior to 3.647.0.