Description
Velociraptor versions prior to 0.76.3 contain a vulnerability in the query() plugin which allows access to all orgs with the user's current ACL token. This allows an authenticated GUI user with access in one org, to use the query() plugin, in a notebook cell, to run VQL queries on other orgs which they may not have access to. The user's permissions in the other org are
the same as the permissions they have in the org containing the notebook.
Published: 2026-04-15
Score: 8 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Apply Patch
AI Analysis

Impact

The vulnerability resides in the Velociraptor query() plugin, where an authenticated GUI user can supply a VQL query in a notebook cell that unintentionally ignores the intended organization boundaries. A user who has permission in one organization can execute arbitrary queries against any other organization using the same ACL token, effectively bypassing the normal access controls. This allows the user to read or manipulate data that they should not have access to, compromising the confidentiality and integrity of data across multiple organizations.

Affected Systems

Rapid7 Velociraptor installations running any version earlier than 0.76.3 are affected. The issue is present in all releases prior to 0.76.3; upgrading to 0.76.3 or later eliminates the flaw.

Risk and Exploitability

The CVSS base score is 8, indicating a high severity vulnerability. While the EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog, the presence of an authenticated GUI user who already has access to at least one organization makes the attack vector realistic. An attacker could leverage this weakness to increase their privilege scope across other organizations without requiring additional credentials. The risk is therefore significant for environments where multiple independent organizations share a Velociraptor instance.

Generated by OpenCVE AI on April 15, 2026 at 19:15 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Velociraptor to version 0.76.3 or later, which contains the patch for the query() plugin bug.
  • Restrict or monitor the use of the query() plugin by users who do not need cross‑organization access, for example by assigning stricter role‑based permissions to notebook sessions.
  • If an immediate upgrade is not possible, disable the query() plugin for users lacking cross‑org privileges or remotely revoke their ACL token before allowing notebook execution in a different organization.

Generated by OpenCVE AI on April 15, 2026 at 19:15 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-hv5g-26jg-pc45 Velociraptor vulnerability in the query() plugin which allows access to all orgs with the user's current ACL token
History

Wed, 15 Apr 2026 22:00:00 +0000

Type Values Removed Values Added
First Time appeared Rapid7
Rapid7 velociraptor
Vendors & Products Rapid7
Rapid7 velociraptor

Wed, 15 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Description Velociraptor versions prior to 0.76.3 contain a vulnerability in the query() plugin which allows access to all orgs with the user's current ACL token. This allows an authenticated GUI user with access in one org, to use the query() plugin, in a notebook cell, to run VQL queries on other orgs which they may not have access to. The user's permissions in the other org are the same as the permissions they have in the org containing the notebook.
Title Velociraptor Query() Plugin Misapplies Permissions To Orgs
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 8, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

Rapid7 Velociraptor
cve-icon MITRE

Status: PUBLISHED

Assigner: rapid7

Published:

Updated: 2026-04-16T03:55:38.112Z

Reserved: 2026-04-14T17:31:37.803Z

Link: CVE-2026-6290

cve-icon Vulnrichment

Updated: 2026-04-15T17:55:55.350Z

cve-icon NVD

Status : Received

Published: 2026-04-15T18:17:25.030

Modified: 2026-04-15T18:17:25.030

Link: CVE-2026-6290

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T21:45:14Z

Weaknesses