Khoj is a self-hostable artificial intelligence app. Prior to 2.0.0-beta.23, an IDOR in the Notion OAuth callback allows an attacker to hijack any user's Notion integration by manipulating the state parameter. The callback endpoint accepts any user UUID without verifying the OAuth flow was initiated by that user, allowing attackers to replace victims' Notion configurations with their own, resulting in data poisoning and unauthorized access to the victim's Khoj search index. This attack requires knowing the user's UUID which can be leaked through shared conversations where an AI generated image is present. This vulnerability is fixed in 2.0.0-beta.23.
References
| Link | Resource |
|---|---|
| https://github.com/khoj-ai/khoj/commit/1b7ccd141d47f365edeccc57d7316cb0913d748b | Patch |
| https://github.com/khoj-ai/khoj/releases/tag/2.0.0-beta.23 | Product Release Notes |
| https://github.com/khoj-ai/khoj/security/advisories/GHSA-6whj-7qmg-86qj | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
27 Feb 2026, 20:34
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:khoj:khoj:2.0.0:beta19:*:*:*:*:*:* cpe:2.3:a:khoj:khoj:2.0.0:beta1:*:*:*:*:*:* cpe:2.3:a:khoj:khoj:2.0.0:beta12:*:*:*:*:*:* cpe:2.3:a:khoj:khoj:2.0.0:beta18:*:*:*:*:*:* cpe:2.3:a:khoj:khoj:2.0.0:beta20:*:*:*:*:*:* cpe:2.3:a:khoj:khoj:2.0.0:beta22:*:*:*:*:*:* cpe:2.3:a:khoj:khoj:2.0.0:beta15:*:*:*:*:*:* cpe:2.3:a:khoj:khoj:2.0.0:beta2:*:*:*:*:*:* cpe:2.3:a:khoj:khoj:2.0.0:beta10:*:*:*:*:*:* cpe:2.3:a:khoj:khoj:2.0.0:beta14:*:*:*:*:*:* cpe:2.3:a:khoj:khoj:2.0.0:beta13:*:*:*:*:*:* cpe:2.3:a:khoj:khoj:2.0.0:beta21:*:*:*:*:*:* cpe:2.3:a:khoj:khoj:2.0.0:beta17:*:*:*:*:*:* cpe:2.3:a:khoj:khoj:*:*:*:*:*:*:*:* cpe:2.3:a:khoj:khoj:2.0.0:beta16:*:*:*:*:*:* cpe:2.3:a:khoj:khoj:2.0.0:beta11:*:*:*:*:*:* |
|
| Summary |
|
|
| First Time |
Khoj khoj
Khoj |
|
| References | () https://github.com/khoj-ai/khoj/commit/1b7ccd141d47f365edeccc57d7316cb0913d748b - Patch | |
| References | () https://github.com/khoj-ai/khoj/releases/tag/2.0.0-beta.23 - Product, Release Notes | |
| References | () https://github.com/khoj-ai/khoj/security/advisories/GHSA-6whj-7qmg-86qj - Exploit, Vendor Advisory |
02 Feb 2026, 23:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-02 23:16
Updated : 2026-02-27 20:34
NVD link : CVE-2025-69207
Mitre link : CVE-2025-69207
CVE.ORG link : CVE-2025-69207
JSON object : View
Products Affected
khoj
- khoj
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
