Home

Description

In affected versions of Octopus Server it was possible for a low privileged user to manipulate an API request to change the signing key expiration and revocation time frames via an API endpoint that had incorrect permission validation. It was not possible to expose the signing keys using this vulnerability.

PUBLISHED Reserved 2026-02-26 | Published 2026-03-17 | Updated 2026-03-17 | Assigner Octopus




LOW: 2.3CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

Problem types

Low-Privilege User Can Modify Global Signing Key Settings

Product status

Default status
unaffected

2023.0.0 (custom) before 2025.3.14731
affected

2025.4.0 (custom) before 2025.4.10359
affected

2026.1.0 (custom) before 2026.1.5571
affected

Credits

This vulnerability was found by raihanadiarba finder

References

advisories.octopus.com/post/2026/sa2026-03

cve.org (CVE-2026-3237)

nvd.nist.gov (CVE-2026-3237)

Download JSON