PT-2025-26266 · Unknown · Velociraptor
Christian Fünfhaus
·
Published
2025-06-20
·
Updated
2025-11-02
·
CVE-2025-6264
CVSS v3.1
5.5
Medium
| AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L |
Name of the Vulnerable Software and Affected Versions
Velociraptor (affected versions not specified)
Description
The issue concerns the Velociraptor's artifact collection feature, which allows users to collect and execute VQL queries packaged into artifacts from endpoints. These artifacts typically run with elevated permissions. A specific artifact,
Admin.Client.UpdateClientConfig, used for updating the client's configuration, did not enforce an additional required permission. As a result, users with COLLECT CLIENT permissions, usually granted by the "Investigator" role, could collect this artifact from endpoints and update the configuration. This can lead to arbitrary command execution and endpoint takeover. To exploit this issue, the user must already have access to collect artifacts from the endpoint, typically granted by the "Investigator" role.Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Exploit
LPE
Incorrect Default Permissions
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Velociraptor