CVE-2025-0539
10.04.2025, 06:15
In affected Microsoft Windows versions of Octopus Deploy, the server can be coerced into sending server-side requests that contain authentication material allowing a suitably positioned attacker to compromise the account running Octopus Server and potentially the host infrastructure itself.
Vendor | Product | Version |
---|---|---|
octopus | octopus_server | 2.6.0 ≤ 𝑥 < 2024.3.13071 |
octopus | octopus_server | 2024.4.401 ≤ 𝑥 < 2024.4.7065 |
𝑥
= Vulnerable software versions