In affected versions of Octopus Server it was possible for a low privileged user to manipulate an API request to change the signing key expiration and revocation time frames via an API endpoint that had incorrect permission validation. It was not possible to expose the signing keys using this vulnerability.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://advisories.octopus.com/post/2026/sa2026-03 |
|
History
Tue, 17 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-285 | |
| Metrics |
ssvc
|
Tue, 17 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Octopus
Octopus octopus Server |
|
| Vendors & Products |
Octopus
Octopus octopus Server |
Tue, 17 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In affected versions of Octopus Server it was possible for a low privileged user to manipulate an API request to change the signing key expiration and revocation time frames via an API endpoint that had incorrect permission validation. It was not possible to expose the signing keys using this vulnerability. | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Octopus
Published: 2026-03-17T06:37:59.369Z
Updated: 2026-03-17T13:20:24.029Z
Reserved: 2026-02-26T00:26:01.068Z
Link: CVE-2026-3237
Updated: 2026-03-17T13:20:14.956Z
Status : Awaiting Analysis
Published: 2026-03-17T07:16:03.610
Modified: 2026-03-17T14:20:01.670
Link: CVE-2026-3237
No data.