CVE-2026-3237 PUBLISHED

Assigner: Octopus
Reserved: 26.02.2026 Published: 17.03.2026 Updated: 17.03.2026

In affected versions of Octopus Server it was possible for a low privileged user to manipulate an API request to change the signing key expiration and revocation time frames via an API endpoint that had incorrect permission validation. It was not possible to expose the signing keys using this vulnerability.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
CVSS Score: 2.3

Product Status

Vendor Octopus Deploy
Product Octopus Server
Versions Default: unaffected
  • affected from 2023.0.0 to 2025.3.14731 (excl.)
  • affected from 2025.4.0 to 2025.4.10359 (excl.)
  • affected from 2026.1.0 to 2026.1.5571 (excl.)

Credits

  • This vulnerability was found by raihanadiarba finder

References

Problem Types

  • Low-Privilege User Can Modify Global Signing Key Settings