In affected versions of Octopus Deploy it was possible to upload files to unexpected locations on the host using an API endpoint. The field lacked validation which could potentially result in ways to circumvent expected workflows.
References
Link | Resource |
---|---|
https://advisories.octopus.com/post/2024/sa2025-03/ | Broken Link |
https://advisories.octopus.com/post/2025/sa2025-03/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
02 Jul 2025, 17:23
Type | Values Removed | Values Added |
---|---|---|
References | () https://advisories.octopus.com/post/2025/sa2025-03/ - Vendor Advisory | |
References | () https://advisories.octopus.com/post/2024/sa2025-03/ - Broken Link | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
First Time |
Octopus octopus Server
Microsoft Octopus Microsoft windows |
|
CPE | cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
25 Feb 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
11 Feb 2025, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-11 11:15
Updated : 2025-07-02 17:23
NVD link : CVE-2025-0526
Mitre link : CVE-2025-0526
JSON object : View
Products Affected
microsoft
- windows
octopus
- octopus_server
CWE
No CWE.