Description
Improper input validation in the apps and endpoints configuration in PowerShell Universal before 2026.1.4 allows an authenticated user with permissions to create or modify Apps or Endpoints to override existing application or system routes, resulting in unintended request routing and denial of service via a conflicting URL path.
Published: 2026-03-17
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via unintended request routing
Action: Patch Upgrade
AI Analysis

Impact

Improper input validation in PowerShell Universal allows an authenticated user with permissions to create or modify apps or endpoints to override existing application or system routes, resulting in unintended request routing and denial of service due to a conflicting URL path. The weakness corresponds to CWE-1289, exposing the application to path manipulation attacks that can disrupt service availability.

Affected Systems

All installations of Devolutions PowerShell Universal prior to version 2026.1.4 are affected. The vendor, Devolutions, has identified this as a flaw in all versions before the 2026.1.4 release.

Risk and Exploitability

The CVSS score is 5.5, indicating a moderate severity. The EPSS score is below 1%, suggesting a low likelihood of exploitation, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires an authenticated user who already has the authority to create or modify apps or endpoints; the attack vector is therefore limited to authorized users within the target environment.

Generated by OpenCVE AI on March 19, 2026 at 15:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor-provided patch by upgrading PowerShell Universal to version 2026.1.4 or later.
  • Check the vendor’s security advisory (https://devolutions.net/security/advisories/DEVO-2026-0008) for any additional mitigation steps.
  • If an immediate upgrade is not possible, review and restrict permissions for users who can create or modify apps and endpoints to prevent unauthorized route overrides.
  • Monitor application logs for unexpected route changes or denial-of-service events to detect potential exploitation attempts.

Generated by OpenCVE AI on March 19, 2026 at 15:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 13:30:00 +0000

Type Values Removed Values Added
Title Authenticated Route Override in Devolutions PowerShell Universal

Thu, 19 Mar 2026 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Ironmansoftware
Ironmansoftware powershell Universal
CPEs cpe:2.3:a:ironmansoftware:powershell_universal:*:*:*:*:*:*:*:*
Vendors & Products Ironmansoftware
Ironmansoftware powershell Universal

Wed, 18 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Devolutions
Devolutions powershell Universal
Vendors & Products Devolutions
Devolutions powershell Universal

Tue, 17 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 17 Mar 2026 19:30:00 +0000

Type Values Removed Values Added
Description Improper input validation in the apps and endpoints configuration in PowerShell Universal before 2026.1.4 allows an authenticated user with permissions to create or modify Apps or Endpoints to override existing application or system routes, resulting in unintended request routing and denial of service via a conflicting URL path.
Weaknesses CWE-1289
References

Subscriptions

Devolutions Powershell Universal
Ironmansoftware Powershell Universal
cve-icon MITRE

Status: PUBLISHED

Assigner: DEVOLUTIONS

Published:

Updated: 2026-03-17T20:04:00.419Z

Reserved: 2026-03-04T19:53:50.594Z

Link: CVE-2026-3563

cve-icon Vulnrichment

Updated: 2026-03-17T20:03:56.949Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-17T20:16:14.587

Modified: 2026-03-19T13:04:11.647

Link: CVE-2026-3563

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-24T10:54:42Z

Weaknesses