In affected Microsoft Windows versions of Octopus Deploy, the server can be coerced into sending server-side requests that contain authentication material allowing a suitably positioned attacker to compromise the account running Octopus Server and potentially the host infrastructure itself.
2025-04-10T06:15:53.133
2025-07-02T17:23:54.550
Analyzed
CVSSv3.1: 8.8 (HIGH)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | octopus | octopus_server | < 2024.3.13071 | Yes |
| Application | octopus | octopus_server | < 2024.4.7065 | Yes |
| Operating System | microsoft | windows | - | No |