Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2025-0539


In affected Microsoft Windows versions of Octopus Deploy, the server can be coerced into sending server-side requests that contain authentication material allowing a suitably positioned attacker to compromise the account running Octopus Server and potentially the host infrastructure itself.


Published

2025-04-10T06:15:53.133

Last Modified

2025-07-02T17:23:54.550

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 8.8 (HIGH)

Weaknesses
  • Type: Secondary
    CWE-918

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application octopus octopus_server < 2024.3.13071 Yes
Application octopus octopus_server < 2024.4.7065 Yes
Operating System microsoft windows - No

References