CVE-2025-0914 Velociraptor Shell Plugin prevent_execve bypass

Publishedon 2025-02-25

An improper access control issue in the VQL shell feature in Velociraptor Versions < 0.73.4 allowed authenticated users to execute the execve() plugin in deployments where this was explicitly forbidden by configuring the prevent_execve flag in the configuration file.

This setting is not usually recommended and is uncommonly used, so this issue will only affect users who do set it.

This issue is fixed in release 0.73.4

Required configuration for exposure:

Requires the prevent_execve option to be enabled.

Problem:

CWE-281 Improper Preservation of Permissions CWE-281

Impact:

CAPEC-176 Configuration/Environment Manipulation CAPEC-176

Exploits:

Using the query() plugin it is possible to run the execve() plugin on systems where the prevent_execve configuration parameter is set.

Product Status:

ProductAffected
Rapid7 Velociraptor on Windows, MacOS, Linux, x86, ARM, 64 bit, 32 bit

Default status is unaffected
before 0.73.4

Solution:

Upgrade endpoint agent to release 0.73.4

Credits:

Darragh O'Reilley, SUSE