CVE-2025-6264
Velociraptor vulnerability analysis and mitigation

Overview

Velociraptor, a software that allows collection of VQL queries packaged into Artifacts from endpoints, was found to have a privilege escalation vulnerability (CVE-2025-6264) discovered by Christian Fünfhaus from Deutsche Bahn CSIRT. The vulnerability affects Rapid7 Velociraptor installations on Windows, MacOS, and Linux platforms before version 0.74.3. The issue stems from the Admin.Client.UpdateClientConfig artifact not enforcing additional required permissions, allowing users with basic COLLECT_CLIENT permissions to perform unauthorized configuration updates (Velociraptor Docs).

Technical details

The vulnerability is classified as CWE-276 (Incorrect Default Permissions) and has been assigned a CVSS v3.1 score of 5.5 (Medium) with vector CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L. The technical issue involves the Admin.Client.UpdateClientConfig artifact, which is designed to update client configurations but failed to implement proper permission checks. This allowed users with basic COLLECT_CLIENT permissions, typically granted through the 'Investigator' role, to bypass intended security restrictions (Velociraptor Docs, Wiz).

Impact

The vulnerability can lead to arbitrary command execution and endpoint takeover. Users with COLLECT_CLIENT permissions can exploit this flaw to update client configurations beyond their intended privileges, potentially compromising system security. The attack follows the CAPEC-23 File Content Injection pattern (Velociraptor Docs).

Mitigation and workarounds

To mitigate this vulnerability, organizations should implement the 'basic artifacts' mechanism as described in the Velociraptor documentation. Additionally, users should run the artifact verifier to detect unintended privilege escalations in custom artifacts. These security measures are detailed in the documentation at the security section of Velociraptor's website (Velociraptor Docs).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management