PT-2025-26266 · Unknown · Velociraptor

Christian Fünfhaus

·

Published

2025-06-20

·

Updated

2025-10-12

·

CVE-2025-6264

CVSS v3.1
5.5
VectorAV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L
Name of the Vulnerable Software and Affected Versions Velociraptor (affected versions not specified)
Description The issue concerns the Velociraptor's artifact collection feature, which allows users to collect and execute VQL queries packaged into artifacts from endpoints. These artifacts typically run with elevated permissions. A specific artifact,
Admin.Client.UpdateClientConfig
, used for updating the client's configuration, did not enforce an additional required permission. As a result, users with
COLLECT CLIENT
permissions, usually granted by the "Investigator" role, could collect this artifact from endpoints and update the configuration. This can lead to arbitrary command execution and endpoint takeover. To exploit this issue, the user must already have access to collect artifacts from the endpoint, typically granted by the "Investigator" role.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability.

LPE

Incorrect Default Permissions

Weakness Enumeration

Related Identifiers

CVE-2025-6264
GHSA-GPFC-MPH4-QM24
GO-2025-3768

Affected Products

Velociraptor