CVE-2025-0539
10.04.2025, 06:15
In affected Microsoft Windows versions of Octopus Deploy, the server can be coerced into sending server-side requests that contain authentication material allowing a suitably positioned attacker to compromise the account running Octopus Server and potentially the host infrastructure itself.
Awaiting analysis
This vulnerability is currently awaiting analysis.