
Cloud Vulnerability DB
A community-led vulnerabilities database
Velociraptor, a software that allows collection of VQL queries packaged into Artifacts from endpoints, was found to have a privilege escalation vulnerability (CVE-2025-6264) discovered by Christian Fünfhaus from Deutsche Bahn CSIRT. The vulnerability affects Rapid7 Velociraptor installations on Windows, MacOS, and Linux platforms before version 0.74.3. The issue stems from the Admin.Client.UpdateClientConfig artifact not enforcing additional required permissions, allowing users with basic COLLECT_CLIENT permissions to perform unauthorized configuration updates (Velociraptor Docs).
The vulnerability is classified as CWE-276 (Incorrect Default Permissions) and has been assigned a CVSS v3.1 score of 5.5 (Medium) with vector CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L. The technical issue involves the Admin.Client.UpdateClientConfig artifact, which is designed to update client configurations but failed to implement proper permission checks. This allowed users with basic COLLECT_CLIENT permissions, typically granted through the 'Investigator' role, to bypass intended security restrictions (Velociraptor Docs, Wiz).
The vulnerability can lead to arbitrary command execution and endpoint takeover. Users with COLLECT_CLIENT permissions can exploit this flaw to update client configurations beyond their intended privileges, potentially compromising system security. The attack follows the CAPEC-23 File Content Injection pattern (Velociraptor Docs).
To mitigate this vulnerability, organizations should implement the 'basic artifacts' mechanism as described in the Velociraptor documentation. Additionally, users should run the artifact verifier to detect unintended privilege escalations in custom artifacts. These security measures are detailed in the documentation at the security section of Velociraptor's website (Velociraptor Docs).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."