First published: Tue Feb 11 2025(Updated: )
In affected versions of Octopus Deploy where customers are using Active Directory for authentication it was possible for an unauthenticated user to make an API request against two endpoints which would retrieve some data from the associated Active Directory. The requests when crafted correctly would return specific information from user profiles (Email address/UPN and Display name) from one endpoint and group information ( Group ID and Display name) from the other. This vulnerability does not expose data within the Octopus Server product itself.
Credit: security@octopus.com
Affected Software | Affected Version | How to fix |
---|---|---|
Octopus Deploy |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0589 is considered a high-severity vulnerability due to its potential for data exposure.
To fix CVE-2025-0589, ensure that you update to the latest version of Octopus Deploy that addresses this vulnerability.
CVE-2025-0589 affects specific versions of Octopus Deploy that utilize Active Directory for authentication.
Yes, CVE-2025-0589 can be exploited remotely as it allows unauthenticated users to make API requests.
CVE-2025-0589 could potentially expose sensitive data from the associated Active Directory.