In affected Microsoft Windows versions of Octopus Deploy, the server can be coerced into sending server-side requests that contain authentication material allowing a suitably positioned attacker to compromise the account running Octopus Server and potentially the host infrastructure itself.
History

Tue, 15 Apr 2025 21:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-918

Thu, 10 Apr 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 10 Apr 2025 05:30:00 +0000

Type Values Removed Values Added
Description In affected Microsoft Windows versions of Octopus Deploy, the server can be coerced into sending server-side requests that contain authentication material allowing a suitably positioned attacker to compromise the account running Octopus Server and potentially the host infrastructure itself.
References
Metrics cvssV4_0

{'score': 5.9, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Octopus

Published:

Updated: 2025-04-15T20:25:25.322Z

Reserved: 2025-01-17T06:55:32.593Z

Link: CVE-2025-0539

cve-icon Vulnrichment

Updated: 2025-04-10T14:25:01.801Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-04-10T06:15:53.133

Modified: 2025-04-15T21:15:46.847

Link: CVE-2025-0539

cve-icon Redhat

No data.