CVE-2026-6290 Velociraptor query() plugin misapplies permissions to orgs

Published on 2026-04-08

Velociraptor versions prior to 0.76.3 contain a vulnerability in the query() plugin which allows access to all orgs with the user's current ACL token.

This allows an authenticated GUI user with access in one org, to use the query() plugin, in a notebook cell, to run VQL queries on other orgs which they may not have access to. The user's permissions in the other org are the same as the permissions they have in the org containing the notebook.

Problem:

CWE-863: Incorrect Authorization CWE-863

Impact:

CAPEC-114: Authentication Abuse CAPEC-114

Product Status:

Product Affected
Rapid7 Velociraptor on Linux
source repo
Default status is unaffected
before 0.76.3
before 0.75.8

Credits:

We thank Faisal Alhumaid for reporting this issue responsibly.

Required configuration for exposure:

This issue affects deployments relying on org separation to contain untrusted users to a subset of orgs.

Most Velociraptor users use multiple Orgs to separate different environments but have the same group of trusted users with access to all orgs. In this case, this vulnerability does not apply since all users have the same permissions on all orgs.

Recommendation

You can disable the query() plugin by adding the following YAML to your server.config.yaml

security:
  denied_plugins:
    - query

To remediate, you will need to upgrade your server to the latest version of your release:

  • For 0.76 releases, upgrade immediately to v0.76.3
  • For 0.75 releases, upgrade immediately to v0.75.8