Published on 2026-04-08
Velociraptor versions prior to 0.76.3 contain a vulnerability in the query() plugin which allows access to all orgs with the user's current ACL token.
This allows an authenticated GUI user with access in one org, to use the query() plugin, in a notebook cell, to run VQL queries on other orgs which they may not have access to. The user's permissions in the other org are the same as the permissions they have in the org containing the notebook.
CWE-863: Incorrect Authorization
CWE-863
CAPEC-114: Authentication Abuse
CAPEC-114
| Product | Affected |
|---|---|
|
Rapid7 Velociraptor
on
Linux
source repo Default status is unaffected |
before 0.76.3
before 0.75.8 |
We thank Faisal Alhumaid for reporting this issue responsibly.
This issue affects deployments relying on org separation to contain untrusted users to a subset of orgs.
Most Velociraptor users use multiple Orgs to separate different environments but have the same group of trusted users with access to all orgs. In this case, this vulnerability does not apply since all users have the same permissions on all orgs.
You can disable the query() plugin by adding the following
YAML to your
server.config.yaml
security:
denied_plugins:
- query
To remediate, you will need to upgrade your server to the latest version of your release: