| Risk | High |
| Patch available | YES |
| Number of vulnerabilities | 1 |
| CVE-ID | CVE-2025-6264 |
| CWE-ID | CWE-276 |
| Exploitation vector | Network |
| Public exploit | Vulnerability #1 is being exploited in the wild. |
| Vulnerable software |
Velociraptor Other software / Other software solutions |
| Vendor | Velocidex |
Security Bulletin
This security bulletin contains one high risk vulnerability.
EUVDB-ID: #VU116908
Risk: High
CVSSv4.0: 6.4 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H/E:A/U:Amber]
CVE-ID: CVE-2025-6264
CWE-ID:
CWE-276 - Incorrect Default Permissions
Exploit availability: No
DescriptionThe vulnerability allows a remote user to compromise the affected system.
The vulnerability exists due to the Admin.Client.UpdateClientConfig artifact does not enforce an additional required permission, allowing users with COLLECT_CLIENT permissions to collect it from endpoints and update the configuration. A remote user with COLLECT_CLIENT permissions can execute arbitrary code on the affected endpoints.
MitigationInstall updates from vendor's website.
Vulnerable software versionsVelociraptor: 0.1 - 0.74.2
CPE2.3https://docs.velociraptor.app/announcements/advisories/cve-2025-6264/
https://blog.talosintelligence.com/velociraptor-leveraged-in-ransomware-attacks/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.