{"api_version":"1","generated_at":"2026-04-09T20:34:14+00:00","cve":"CVE-2026-5329","urls":{"html":"https://cve.report/CVE-2026-5329","api":"https://cve.report/api/cve/CVE-2026-5329.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-5329","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-5329"},"summary":{"title":"Rapid7 Velociraptor Improper Input Validation in Client Message Handler","description":"Rapid7 Velociraptor versions prior to 0.76.2 contain an improper input validation vulnerability in the client monitoring message handler on the Velociraptor server (primarily Linux) that allows an authenticated remote attacker  to write to arbitrary internal server queues via a crafted monitoring message with a malicious queue name. The server handler that receives client monitoring messages does not sufficiently validate the queue name supplied by the client, allowing a rogue client to write arbitrary messages to privileged internal queues. This may lead to remote code execution on the Velociraptor server. Rapid7 Hosted Velociraptor instances are not affected by this vulnerability.","state":"PUBLISHED","assigner":"rapid7","published_at":"2026-04-09 18:17:04","updated_at":"2026-04-09 18:17:04"},"problem_types":["CWE-20","CWE-20 CWE-20 Improper input validation"],"metrics":[{"version":"3.1","source":"cve@rapid7.com","type":"Secondary","score":"8.5","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H","baseScore":8.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.1","source":"CNA","type":"CVSS","score":"8.5","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H","data":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H","version":"3.1"}}],"references":[{"url":"https://docs.velociraptor.app/announcements/advisories/cve-2026-5329/","name":"https://docs.velociraptor.app/announcements/advisories/cve-2026-5329/","refsource":"cve@rapid7.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-5329","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5329","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Rapid7","product":"Velociraptor","version":"affected 0.76.1 semver","platforms":["Linux"]},{"source":"CNA","vendor":"Rapid7","product":"Velociraptor","version":"affected 0.75.6 semver","platforms":["Linux"]},{"source":"CNA","vendor":"Rapid7","product":"Velociraptor","version":"affected 0.74.6 semver","platforms":["Linux"]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"We thank Chris Au (@netero_1010) from NyxLab for identifying and reporting this issue.","lang":"en"}],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["Linux"],"product":"Velociraptor","repo":"https://github.com/Velocidex/velociraptor","vendor":"Rapid7","versions":[{"lessThanOrEqual":"0.76.1","status":"affected","version":"0","versionType":"semver"},{"lessThanOrEqual":"0.75.6","status":"affected","version":"0","versionType":"semver"},{"lessThanOrEqual":"0.74.6","status":"affected","version":"0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"reporter","value":"We thank Chris Au (@netero_1010) from NyxLab for identifying and reporting this issue."}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Rapid7 Velociraptor versions prior to 0.76.2&nbsp;contain an improper input validation vulnerability in the client monitoring message handler on the Velociraptor server (primarily Linux) that allows an authenticated remote attacker  to write to arbitrary internal server queues via a crafted monitoring message with a malicious queue name. The server handler that receives client monitoring messages&nbsp;does not sufficiently validate the queue name supplied by the client, allowing a rogue client to write arbitrary messages to privileged internal queues. This may lead to remote code execution on the Velociraptor server. Rapid7 Hosted Velociraptor instances are not affected by this vulnerability."}],"value":"Rapid7 Velociraptor versions prior to 0.76.2 contain an improper input validation vulnerability in the client monitoring message handler on the Velociraptor server (primarily Linux) that allows an authenticated remote attacker  to write to arbitrary internal server queues via a crafted monitoring message with a malicious queue name. The server handler that receives client monitoring messages does not sufficiently validate the queue name supplied by the client, allowing a rogue client to write arbitrary messages to privileged internal queues. This may lead to remote code execution on the Velociraptor server. Rapid7 Hosted Velociraptor instances are not affected by this vulnerability."}],"impacts":[{"capecId":"CAPEC-240","descriptions":[{"lang":"en","value":"CAPEC-240 Resource Injection"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-20","description":"CWE-20 Improper input validation","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-09T17:52:05.885Z","orgId":"9974b330-7714-4307-a722-5648477acda7","shortName":"rapid7"},"references":[{"url":"https://docs.velociraptor.app/announcements/advisories/cve-2026-5329/"}],"source":{"discovery":"UNKNOWN"},"title":"Rapid7 Velociraptor Improper Input Validation in Client Message Handler","x_generator":{"engine":"Vulnogram 1.0.1"}}},"cveMetadata":{"assignerOrgId":"9974b330-7714-4307-a722-5648477acda7","assignerShortName":"rapid7","cveId":"CVE-2026-5329","datePublished":"2026-04-09T17:52:05.885Z","dateReserved":"2026-04-01T13:33:23.515Z","dateUpdated":"2026-04-09T17:52:05.885Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-09 18:17:04","lastModifiedDate":"2026-04-09 18:17:04","problem_types":["CWE-20","CWE-20 CWE-20 Improper input validation"],"metrics":{"cvssMetricV31":[{"source":"cve@rapid7.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H","baseScore":8.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":6}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"5329","Ordinal":"1","Title":"Rapid7 Velociraptor Improper Input Validation in Client Message ","CVE":"CVE-2026-5329","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"5329","Ordinal":"1","NoteData":"Rapid7 Velociraptor versions prior to 0.76.2 contain an improper input validation vulnerability in the client monitoring message handler on the Velociraptor server (primarily Linux) that allows an authenticated remote attacker  to write to arbitrary internal server queues via a crafted monitoring message with a malicious queue name. The server handler that receives client monitoring messages does not sufficiently validate the queue name supplied by the client, allowing a rogue client to write arbitrary messages to privileged internal queues. This may lead to remote code execution on the Velociraptor server. Rapid7 Hosted Velociraptor instances are not affected by this vulnerability.","Type":"Description","Title":"Rapid7 Velociraptor Improper Input Validation in Client Message "}]}}}