Description
Improper access control in the entry documentation and attachment features in Devolutions Server allows an authenticated user with vault read access to retrieve the documentation and attachments of sealed entries via a crafted API request.

This issue affects :

* Devolutions Server 2026.1.6.0 through 2026.1.16.0
* Devolutions Server 2025.3.20.0 and earlier
Published: 2026-05-22
Score: 4.3 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Improper access control in Devolutions Server's entry documentation and attachment features allows an authenticated user with vault read access to retrieve documentation and attachments of sealed entries via a crafted API request. The flaw is a missing authorization issue (CWE-862) that can lead to unauthorized disclosure of sensitive sealed entry content, compromising confidentiality. The vulnerability does not allow arbitrary code execution or privilege escalation beyond the permissions of the authenticated user with vault read rights.

Affected Systems

Devolutions Server versions 2026.1.6.0 through 2026.1.16.0 and all 2025.3.20.0 releases and earlier are affected. Users running these releases must verify their server version and check for available updates. Actively using prior or current versions exposes the application to the described access control deficiency.

Risk and Exploitability

The vulnerability requires an authenticated account with vault read privileges, which is a common access level in many deployments. Attackers can craft an API request to retrieve the sealed entry documentation, making exploitation straightforward once authentication is obtained. The assessed CVSS score of 4.3 reflects a moderate risk level. No EPSS data is available, and the vulnerability is not listed in CISA KEV, indicating no known widespread exploits are publicly identified. However, the impact of data disclosure is significant and the attack vector—a crafted API call—is likely to be used by malicious insiders or compromised accounts. Organizations should treat this as a moderate to high risk, especially where sealed entries contain sensitive information.

Generated by OpenCVE AI on May 22, 2026 at 18:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Devolutions Server update that removes the improper access control check
  • Review and restrict vault read permissions to ensure only authorized users can access sealed entries
  • Disable or restrict the API endpoints that expose sealed entry documentation until a patch is in place
  • Monitor API logs for anomalous requests that attempt to retrieve sealed entry attachments

Generated by OpenCVE AI on May 22, 2026 at 18:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 22 May 2026 18:45:00 +0000

Type Values Removed Values Added
Title Improper Access Control Allows Retrieval of Sealed Entry Documents via API

Fri, 22 May 2026 17:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 22 May 2026 16:45:00 +0000

Type Values Removed Values Added
Title Improper Access Control Allows Retrieval of Sealed Entry Documents via API
First Time appeared Devolutions
Devolutions server
Vendors & Products Devolutions
Devolutions server

Fri, 22 May 2026 15:45:00 +0000

Type Values Removed Values Added
Description Improper access control in the entry documentation and attachment features in Devolutions Server allows an authenticated user with vault read access to retrieve the documentation and attachments of sealed entries via a crafted API request. This issue affects : * Devolutions Server 2026.1.6.0 through 2026.1.16.0 * Devolutions Server 2025.3.20.0 and earlier
Weaknesses CWE-862
References

Subscriptions

Devolutions Server
cve-icon MITRE

Status: PUBLISHED

Assigner: DEVOLUTIONS

Published:

Updated: 2026-05-22T16:52:43.390Z

Reserved: 2026-05-21T19:43:31.959Z

Link: CVE-2026-9246

cve-icon Vulnrichment

Updated: 2026-05-22T16:52:27.325Z

cve-icon NVD

No data.

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-22T18:30:42Z

Weaknesses