First published: Thu Apr 10 2025(Updated: )
In affected Microsoft Windows versions of Octopus Deploy, the server can be coerced into sending server-side requests that contain authentication material allowing a suitably positioned attacker to compromise the account running Octopus Server and potentially the host infrastructure itself.
Credit: security@octopus.com
Affected Software | Affected Version | How to fix |
---|---|---|
Octopus Deploy |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0539 is considered a high severity vulnerability due to its potential to compromise accounts running Octopus Server.
To fix CVE-2025-0539, users should update to the latest version of Octopus Deploy provided by Microsoft.
CVE-2025-0539 affects Microsoft Windows versions of Octopus Deploy.
Users of Octopus Deploy who are running affected Microsoft Windows versions are at risk from CVE-2025-0539.
An attacker exploiting CVE-2025-0539 can potentially compromise the account running Octopus Server and the underlying host infrastructure.