First published: Tue Feb 11 2025(Updated: )
In affected versions of Octopus Server it was possible for a user with sufficient access to set custom headers in all server responses. By submitting a specifically crafted referrer header the user could ensure that all subsequent server responses would return 500 errors rendering the site mostly unusable. The user would be able to subsequently set and unset the referrer header to control the denial of service state with a valid CSRF token whilst new CSRF tokens could not be generated.
Credit: security@octopus.com
Affected Software | Affected Version | How to fix |
---|---|---|
Octopus Deploy |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0588 is classified as a high severity vulnerability due to its potential to disrupt server responses.
To fix CVE-2025-0588, update to the latest version of Octopus Server where the vulnerability has been addressed.
CVE-2025-0588 allows a user to manipulate server responses, potentially causing 500 errors and rendering the site unavailable.
Yes, CVE-2025-0588 can be exploited remotely by any user with sufficient access to the Octopus Server.
CVE-2025-0588 affects all versions of Octopus Server prior to the security fix in the latest release.