Impact
An authenticated user with delete permission can delete a PAM account that is currently checked out by combining it with at least one non‑checked‑out account in a bulk delete operation. This flaw permits unauthorized account removal, compromising the integrity of user access and potentially disrupting active sessions. The weakness arises from improper enforcement of behavioral controls, classified as CWE-841.
Affected Systems
Devolutions Server, version 2025.3.15 and earlier. The vulnerability affects all deployments of Devolutions Server running the specified releases, regardless of deployment size or configuration.
Risk and Exploitability
The flaw carries a CVSS 9.8 score and a very low EPSS (<1%), indicating a critical severity but a low probability of public exploitation. It is not listed in the CISA KEV catalog. The attacker must be authenticated and possess delete rights, but once those conditions are met, the vulnerability is trivial to exploit by initiating a bulk deletion that targets a checked‑out account. The impact is the unintended loss of critical PAM accounts and potential service disruption.
OpenCVE Enrichment