Description
Improper enforcement of the sealed-entry workflow in the entry sensitive-data retrieval feature in Devolutions Server allows an authenticated user with access to a sealed entry to retrieve its sensitive data without triggering the unseal audit notification via a crafted API request.

This issue affects :

* Devolutions Server 2026.1.6.0 through 2026.1.16.0
* Devolutions Server 2025.3.20.0 and earlier
Published: 2026-05-22
Score: 2.7 Low
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability originates in Devolutions Server's sealed‑entry workflow. An authenticated user who has permission to a sealed entry can craft a specific API request that retrieves the entry's sensitive data without generating the expected unseal audit notification. Because the audit mechanism is bypassed, the user can read protected data while remaining undetected, potentially compromising the confidentiality of information stored in the server. The weakness is classified as CWE‑841, improper handling of sensitive data.

Affected Systems

Affected are Devolutions Server 2026.1.6.0 through 2026.1.16.0 and 2025.3.20.0 and any earlier releases. Administrators managing these product versions should verify their deployments fall within the impacted range.

Risk and Exploitability

The exploit requires an authenticated account with access to a sealed entry and the ability to send custom API requests; no elevation of privilege is needed. The attack surface is limited to users who already have entry access, but for those users it allows direct read of protected data. EPSS is not available and the flaw is not listed in CISA KEV, so public exploit activity is not yet recorded, yet the potential for abuse remains high given the sensitivity of the data and lack of audit detection. Affected sites should consider the risk substantial until a vendor fix is applied. The CVSS score of 2.7 indicates low severity, but the lack of audit notification remains a concern.

Generated by OpenCVE AI on May 22, 2026 at 18:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Deploy the latest available non‑affected release of Devolutions Server (e.g., any version newer than 2026.1.16.0).
  • If updating immediately is not possible, restrict or disable the sensitive‑data retrieval API for authenticated users until a patch is available.
  • Enable comprehensive audit logging of unseal operations and review logs for any unindicated data retrieval activity.

Generated by OpenCVE AI on May 22, 2026 at 18:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 22 May 2026 19:15:00 +0000

Type Values Removed Values Added
Title Authenticated User Can Retrieve Sealed Entry Data Without Audit Notification

Fri, 22 May 2026 17:45:00 +0000

Type Values Removed Values Added
Title Authenticated User Can Retrieve Sealed Entry Data Without Audit Notification

Fri, 22 May 2026 17:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 2.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 22 May 2026 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Devolutions
Devolutions server
Vendors & Products Devolutions
Devolutions server

Fri, 22 May 2026 15:45:00 +0000

Type Values Removed Values Added
Description Improper enforcement of the sealed-entry workflow in the entry sensitive-data retrieval feature in Devolutions Server allows an authenticated user with access to a sealed entry to retrieve its sensitive data without triggering the unseal audit notification via a crafted API request. This issue affects : * Devolutions Server 2026.1.6.0 through 2026.1.16.0 * Devolutions Server 2025.3.20.0 and earlier
Weaknesses CWE-841
References

Subscriptions

Devolutions Server
cve-icon MITRE

Status: PUBLISHED

Assigner: DEVOLUTIONS

Published:

Updated: 2026-05-22T16:51:48.017Z

Reserved: 2026-05-13T13:25:05.015Z

Link: CVE-2026-8477

cve-icon Vulnrichment

Updated: 2026-05-22T16:51:43.847Z

cve-icon NVD

No data.

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-22T19:00:15Z

Weaknesses