An improper access control issue in the VQL shell feature in Velociraptor Versions < 0.73.4 allowed authenticated users to execute the execve() plugin in deployments where this was explicitly forbidden by configuring the prevent_execve flag in the configuration file. This setting is not usually recommended and is uncommonly used, so this issue will only affect users who do set it. This issue is fixed in release 0.73.4.
History

Tue, 04 Mar 2025 03:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 27 Feb 2025 16:15:00 +0000

Type Values Removed Values Added
Description An improper access control issue in the VQL shell feature in Velociraptor Versions < 0.73.4 allowed authenticated users to execute the execve() plugin in deployments where this was explicitly forbidden by configuring the prevent_execve flag in the configuration file. This setting is not usually recommended and is uncommonly used, so this issue will only affect users who do set it. This issue is fixed in release 0.73.4.
Title Velociraptor Shell Plugin Prevent_execve Bypass
Weaknesses CWE-281
References
Metrics cvssV3_1

{'score': 3.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: rapid7

Published:

Updated: 2025-02-27T16:19:54.044Z

Reserved: 2025-01-30T22:39:47.257Z

Link: CVE-2025-0914

cve-icon Vulnrichment

Updated: 2025-02-27T16:19:50.202Z

cve-icon NVD

Status : Received

Published: 2025-02-27T16:15:38.237

Modified: 2025-02-27T16:15:38.237

Link: CVE-2025-0914

cve-icon Redhat

No data.