Impact
The vulnerability resides in the Velociraptor query() plugin, where an authenticated GUI user can supply a VQL query in a notebook cell that unintentionally ignores the intended organization boundaries. A user who has permission in one organization can execute arbitrary queries against any other organization using the same ACL token, effectively bypassing the normal access controls. This allows the user to read or manipulate data that they should not have access to, compromising the confidentiality and integrity of data across multiple organizations.
Affected Systems
Rapid7 Velociraptor installations running any version earlier than 0.76.3 are affected. The issue is present in all releases prior to 0.76.3; upgrading to 0.76.3 or later eliminates the flaw.
Risk and Exploitability
The CVSS base score is 8, indicating a high severity vulnerability. While the EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog, the presence of an authenticated GUI user who already has access to at least one organization makes the attack vector realistic. An attacker could leverage this weakness to increase their privilege scope across other organizations without requiring additional credentials. The risk is therefore significant for environments where multiple independent organizations share a Velociraptor instance.
OpenCVE Enrichment
Github GHSA