AxonFlow Platform Multi-Tenant Isolation and Access Control Vulnerabilities
Multiple vulnerabilities in AxonFlow platform versions prior to 7.5.0, including multi-tenant isolation issues and SQL injection, could lead to unauthorized access, information disclosure, denial of service, and other security impacts; AxonFlow v7.5.0 resolves these issues.
A consolidated advisory addresses eight independently-filed bug fixes in AxonFlow platform versions before 7.5.0, resolving multi-tenant isolation, access-control, and policy-enforcement defects. Exploitation of these vulnerabilities could allow attackers to bypass authentication, access sensitive data across tenants, or cause a denial of service. The vulnerabilities include MAP execution multi-tenant isolation (CWE-863), cross-tenant audit-log leaks (CWE-200, CWE-863), license-validation bypass (CWE-862), tenant-scope fail-open (CWE-862), internal-service auth fallback bypass (CWE-863), login timing/org-existence disclosure (CWE-208), portal DoS via unbounded request body (CWE-770), and SQL-injection on the Community SaaS hosted endpoint (CWE-89). The vulnerabilities were identified during an internal security review by AxonFlow in April 2026. The primary remediation is to upgrade to AxonFlow platform version 7.5.0 or later.
Attack Chain
- Initial Access: An attacker exploits the license-validation bypass on the
/onboard-customerendpoint to gain unauthenticated access to the onboarding flow. - Privilege Escalation: The attacker leverages the MAP execution multi-tenant isolation vulnerability by providing a malicious
org_idin the request body to override the authenticated organization ID. - Defense Evasion: The attacker bypasses the
apiAuthMiddlewareusing the internal-service auth fallback in Evaluation/Enterprise builds, gaining unauthorized access to internal services. - Information Disclosure: The attacker exploits the cross-tenant audit-log leak via the
/api/v1/evidence/*and/api/v1/decisions/*/explainhandlers to access sensitive audit logs from other tenants. - Discovery: The attacker enumerates valid organizations by observing the different timing and response bodies returned by the login handler for invalid organization versus invalid password attempts.
- Denial of Service: The attacker sends an unbounded request body to the portal, exhausting server memory and causing a denial-of-service condition.
- SQL Injection (Community SaaS): An attacker crafts SQL-injection-shaped requests to the Community SaaS hosted endpoint (
try.getaxonflow.com), bypassing governance and potentially influencing the LLM with malicious queries. - Impact: Successful exploitation allows unauthorized access to tenant data, policy manipulation, denial-of-service, and potential control over the LLM in the Community SaaS environment.
Impact
The vulnerabilities collectively pose a significant risk to AxonFlow platform users, particularly those in multi-tenant environments. Successful exploitation of these vulnerabilities could lead to unauthorized access to sensitive data, policy manipulation, denial of service, and in the case of the Community SaaS platform, SQL injection leading to potential LLM compromise. The audit-log leaks could expose confidential business operations. The portal DoS could disrupt service availability, impacting critical business processes. The SQL-injection vulnerability on try.getaxonflow.com allows attackers to inject malicious queries. Upgrading to version 7.5.0 or later is the primary mitigation step.
Recommendation
- Upgrade to AxonFlow platform version 7.5.0 or later to remediate all identified vulnerabilities.
- For those unable to upgrade immediately, ensure the agent middleware sets
X-Org-ID/X-Tenant-IDfrom authenticated identity at the ingress, never accepting body-supplied identity (mitigates Items 1–5). - For Community SaaS users unable to upgrade immediately, set
SQLI_ACTION=blockexplicitly via the agent task definition to mitigate the SQL-injection vulnerability (Item 8). - Monitor web server logs for abnormally large request bodies targeting the AxonFlow portal, indicative of potential DoS attempts (CWE-770).
- Deploy a web application firewall (WAF) to filter SQL-injection attempts targeting the
try.getaxonflow.comendpoint.
Detection coverage 2
Detect Unusually Large Request Body
mediumDetects unusually large request bodies, which may indicate a denial-of-service attack attempting to exhaust server memory (CWE-770).
Detect Potential SQL Injection Attempts (try.getaxonflow.com)
highDetects potential SQL injection attempts based on common SQL injection syntax in requests to try.getaxonflow.com (CWE-89).
Detection queries are available on the platform. Get full rules →