Published on 2026-04-08
Velociraptor versions prior to 0.76.2 contain an improper input validation vulnerability in the client monitoring message handler on the Velociraptor server (primarily Linux).
This allows an authenticated remote attacker (i.e. a rogue client) to write to arbitrary internal server queues via a crafted monitoring message with a malicious queue name.
The server handler that receives client monitoring messages does not sufficiently validate the queue name supplied by the client, allowing a rogue client to write arbitrary messages to privileged internal queues.
This vulnerability may lead to remote code execution on the Velociraptor server.
Rapid7 Hosted Velociraptor instances are not affected by this vulnerability.
This vulnerability only affects the Velociraptor server, which is typically running on a Linux system
CWE-1287: Improper Validation of Specified Type of Input
CWE-1287
CAPEC-253: Remote Code Inclusion
CAPEC-23
| Product | Affected |
|---|---|
|
Rapid7 Velociraptor
on
Linux
source repo Default status is unaffected |
before 0.76.2
before 0.75.7 |
We thank Chris Au from NyxLab for identifying and reporting this issue responsibly
This is a critical vulnerability, which can not be mitigated through configuration changes.
To remediate, you will need to upgrade your server to the latest version of your release: