
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
In affected versions of Octopus Deploy where customers are using Active Directory for authentication, a vulnerability was discovered that allowed unauthenticated users to access Active Directory data through API endpoints. The vulnerability, identified as CVE-2025-0589, was discovered on December 09, 2024, and patched on January 14, 2025. The issue affects Octopus Server versions from 2020.3.x through 2024.4.x (before 2024.4.7065) (Octopus Advisory).
The vulnerability allows an unauthenticated user to make API requests against two specific endpoints that retrieve data from the associated Active Directory. When properly crafted, these requests could return user profile information (Email address/UPN and Display name) from one endpoint and group information (Group ID and Display name) from the other. The vulnerability has been assigned a CVSS score of 6.9, categorized as Medium severity (Octopus Advisory).
The vulnerability exposes sensitive Active Directory information, including user email addresses, display names, and group information to unauthenticated users. However, it's important to note that this vulnerability does not expose data within the Octopus Server product itself and does not impact customers using Octopus Cloud (Octopus Advisory).
Octopus Deploy has released patches in versions 2024.4.7065 and 2024.3.13071 to address this vulnerability. Users are strongly recommended to upgrade to the latest version (2024.4.7076) or at minimum to one of the patched versions. There are no known mitigations for this vulnerability other than upgrading to a fixed version (Octopus Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”