In affected Microsoft Windows versions of Octopus Deploy, the server can be coerced into sending server-side requests that contain authentication material allowing a suitably positioned attacker to compromise the account running Octopus Server and potentially the host infrastructure itself.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://advisories.octopus.com/post/2025/sa2025-06 |
![]() ![]() |
History
Tue, 15 Apr 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-918 |
Thu, 10 Apr 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 10 Apr 2025 05:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In affected Microsoft Windows versions of Octopus Deploy, the server can be coerced into sending server-side requests that contain authentication material allowing a suitably positioned attacker to compromise the account running Octopus Server and potentially the host infrastructure itself. | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Octopus
Published: 2025-04-10T05:20:38.264Z
Updated: 2025-04-15T20:25:25.322Z
Reserved: 2025-01-17T06:55:32.593Z
Link: CVE-2025-0539

Updated: 2025-04-10T14:25:01.801Z

Status : Awaiting Analysis
Published: 2025-04-10T06:15:53.133
Modified: 2025-04-15T21:15:46.847
Link: CVE-2025-0539

No data.