Description
Authorization bypass in the entry duplication feature in Devolutions Server allows an authenticated user with write access to any vault to copy documentation and attachments from an entry in a vault they cannot access via a crafted save request.

This issue affects :

* Devolutions Server 2026.1.6.0 through 2026.1.16.0
* Devolutions Server 2025.3.20.0 and earlier
Published: 2026-05-22
Score: 2.6 Low
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability is an authorization bypass in Devolutions Server's entry duplication feature that lets an authenticated user with write access to any vault copy documentation and attachments from an entry in a vault they cannot normally read. The attacker can trigger the copy by sending a crafted save request, thereby gaining unauthorized access to sensitive data. The weakness corresponds to CWE‑639, which represents a flaw in checking the user’s privileges before allowing the operation, resulting in an information disclosure scenario.

Affected Systems

The affected software is Devolutions Server, with all releases from 2026.1.6.0 to 2026.1.16.0 and all 2025.3.20.0 releases and earlier vulnerable to this flaw.

Risk and Exploitability

The CVSS score of 2.6 indicates low severity. The EPSS score is not available and the vulnerability is not listed in CISA's KEV catalog, which suggests no known public exploitation yet. However, the flaw allows any authenticated user who has write permissions on a vault to bypass authorization and retrieve contents from another vault, so the attack can be executed by users with the right privileges. The low CVSS score still reflects a low risk, but unauthorized duplication of sensitive data can be significant in certain contexts. The vulnerability can be triggered by mocking a save request via the web interface or API, requiring only knowledge of the target vault identifiers and the ability to submit an HTTP request.

Generated by OpenCVE AI on May 22, 2026 at 18:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Devolutions Server to a newer release that resolves the duplication issue (any version newer than 2026.1.16.0).
  • Restrict write access on vaults to only those users who truly need it, applying the principle of least privilege.
  • Review and audit users’ permissions to ensure that no unnecessary write rights are granted to sensitive vaults.

Generated by OpenCVE AI on May 22, 2026 at 18:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 22 May 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Devolutions
Devolutions server
Vendors & Products Devolutions
Devolutions server

Fri, 22 May 2026 19:15:00 +0000

Type Values Removed Values Added
Title Authorization Bypass Enables Unauthorized Copy of Vault Entry Documentation

Fri, 22 May 2026 17:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 2.6, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 22 May 2026 16:45:00 +0000

Type Values Removed Values Added
Title Authorization Bypass Enables Unauthorized Copy of Vault Entry Documentation

Fri, 22 May 2026 15:45:00 +0000

Type Values Removed Values Added
Description Authorization bypass in the entry duplication feature in Devolutions Server allows an authenticated user with write access to any vault to copy documentation and attachments from an entry in a vault they cannot access via a crafted save request. This issue affects : * Devolutions Server 2026.1.6.0 through 2026.1.16.0 * Devolutions Server 2025.3.20.0 and earlier
Weaknesses CWE-639
References

Subscriptions

Devolutions Server
cve-icon MITRE

Status: PUBLISHED

Assigner: DEVOLUTIONS

Published:

Updated: 2026-05-22T16:56:44.768Z

Reserved: 2026-05-21T19:44:28.926Z

Link: CVE-2026-9248

cve-icon Vulnrichment

Updated: 2026-05-22T16:56:37.570Z

cve-icon NVD

No data.

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-22T19:15:24Z

Weaknesses