Rapid7 Velociraptor Improper Input Validation in Client Message Handler
Summary
| CVE | CVE-2026-5329 |
|---|---|
| State | PUBLISHED |
| Assigner | rapid7 |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-09 18:17:04 UTC |
| Updated | 2026-04-09 18:17:04 UTC |
| Description | Rapid7 Velociraptor versions prior to 0.76.2 contain an improper input validation vulnerability in the client monitoring message handler on the Velociraptor server (primarily Linux) that allows an authenticated remote attacker to write to arbitrary internal server queues via a crafted monitoring message with a malicious queue name. The server handler that receives client monitoring messages does not sufficiently validate the queue name supplied by the client, allowing a rogue client to write arbitrary messages to privileged internal queues. This may lead to remote code execution on the Velociraptor server. Rapid7 Hosted Velociraptor instances are not affected by this vulnerability. |
Risk And Classification
Primary CVSS: v3.1 8.5 HIGH from [email protected]
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
Problem Types: CWE-20 | CWE-20 CWE-20 Improper input validation
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Secondary | 8.5 | HIGH | CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H |
| 3.1 | CNA | CVSS | 8.5 | HIGH | CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
HighPrivileges Required
LowUser Interaction
NoneScope
ChangedConfidentiality
HighIntegrity
HighAvailability
HighCVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Rapid7 | Velociraptor | affected 0.76.1 semver | Linux |
| CNA | Rapid7 | Velociraptor | affected 0.75.6 semver | Linux |
| CNA | Rapid7 | Velociraptor | affected 0.74.6 semver | Linux |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| docs.velociraptor.app/announcements/advisories/cve-2026-5329 | [email protected] | docs.velociraptor.app | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
CNA: We thank Chris Au (@netero_1010) from NyxLab for identifying and reporting this issue. (en)
There are currently no legacy QID mappings associated with this CVE.