Endpoint Privilege Manager CyberArk Endpoint Privilege Manager

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in CyberArk Endpoint Privilege Manager.

By the Year

In 2026 there have been 1 vulnerability in CyberArk Endpoint Privilege Manager with an average score of 7.8 out of ten. Last year, in 2025 Endpoint Privilege Manager had 4 security vulnerabilities published. At the current rates, it appears that the number of vulnerabilities last year and this year may equal out.




Year Vulnerabilities Average Score
2026 1 7.80
2025 4 0.00
2024 0 0.00
2023 0 0.00
2022 1 7.80
2021 0 0.00
2020 1 5.50
2019 2 0.00
2018 2 7.60

It may take a day or so for new Endpoint Privilege Manager vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent CyberArk Endpoint Privilege Manager Security Vulnerabilities

CVE-2025-66374: Priv Escalation in CyberArk EPMA 25.10.0 via Admin Task Policy
CVE-2025-66374 7.8 - High - February 03, 2026

CyberArk Endpoint Privilege Manager Agent through 25.10.0 allows a local user to achieve privilege escalation through policy elevation of an Administration task.

Improper Privilege Management

CyberArk Endpoint Privilege Manager SaaS 24.7.1: Content Field HTML Injection
CVE-2025-22274 - February 28, 2025

It is possible to inject HTML code into the page content using the "content" field in the "Application definition" page. This issue affects CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown. After multiple attempts to contact the vendor we did not receive any answer.

CyberArk EPM 24.7.1 – Unrestricted Brute Force to /ChangePassword
CVE-2025-22273 - February 28, 2025

Application does not limit the number or frequency of user interactions, such as the number of incoming requests. At the "/EPMUI/VfManager.asmx/ChangePassword" endpoint it is possible to perform a brute force attack on the current password in use. This issue affects CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown. After multiple attempts to contact the vendor we did not receive any answer.

IP Address Spoofing via XFF Header in CyberArk EPM SaaS 24.7.1
CVE-2025-22271 - February 28, 2025

The application or its infrastructure allows for IP address spoofing by providing its own value in the "X-Forwarded-For" header. Thus, the action logging mechanism in the application loses accountability This issue affects CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown. After multiple attempts to contact the vendor we did not receive any answer.

CyberArk EPManager 24.7.1 Role Name XSS via Admin Panel
CVE-2025-22270 - February 28, 2025

An attacker with access to the Administration panel, specifically the "Role Management" tab, can inject code by adding a new role in the "name" field. It should be noted, however, that the risk of exploiting vulnerability is reduced due to the required additional error that allows bypassing the Content-Security-Policy policy, which mitigates JS code execution while still allowing HTML injection. This issue affects CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown. After multiple attempts to contact the vendor we did not receive any answer.

CyberArk Endpoint Privilege Manager (EPM) through 11.5.3.328 before 2021-12-20
CVE-2021-44049 7.8 - High - January 15, 2022

CyberArk Endpoint Privilege Manager (EPM) through 11.5.3.328 before 2021-12-20 allows a local user to gain elevated privileges via a Trojan horse Procmon64.exe in the user's Temp directory.

Exposure of Resource to Wrong Sphere

CyberArk Endpoint Privilege Manager (EPM) 11.1.0.173 allows attackers to bypass a Credential Theft protection mechanism by injecting a DLL into a process
CVE-2020-25738 5.5 - Medium - November 27, 2020

CyberArk Endpoint Privilege Manager (EPM) 11.1.0.173 allows attackers to bypass a Credential Theft protection mechanism by injecting a DLL into a process that normally has credential access, such as a Chrome process that reads credentials from a SQLite database.

DLL preloading

CyberArk Endpoint Privilege Manager 10.2.1.603 and earlier
CVE-2018-14894 - April 09, 2019

CyberArk Endpoint Privilege Manager 10.2.1.603 and earlier allows an attacker (who is able to edit permissions of a file) to bypass intended access restrictions and execute blocked applications.

A buffer overflow in the kernel driver CybKernelTracker.sys in CyberArk Endpoint Privilege Manager versions prior to 10.7
CVE-2019-9627 - March 08, 2019

A buffer overflow in the kernel driver CybKernelTracker.sys in CyberArk Endpoint Privilege Manager versions prior to 10.7 allows an attacker (without Administrator privileges) to escalate privileges or crash the machine by loading an image, such as a DLL, with a long path.

In CyberArk Endpoint Privilege Manager (formerly Viewfinity), Privilege Escalation is possible if the attacker has one process
CVE-2018-13052 9.8 - Critical - July 05, 2018

In CyberArk Endpoint Privilege Manager (formerly Viewfinity), Privilege Escalation is possible if the attacker has one process that executes as Admin.

In CyberArk Endpoint Privilege Manager (formerly Viewfinity) 10.2.1.603, there is persistent XSS
CVE-2018-12903 5.4 - Medium - June 26, 2018

In CyberArk Endpoint Privilege Manager (formerly Viewfinity) 10.2.1.603, there is persistent XSS via an account name on the create token screen, the VfManager.asmx SelectAccounts->DisplayName screen, a user's groups in ConfigurationPage, the Dialog Title field, and App Group Name in the Application Group Wizard.

XSS

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for CyberArk Endpoint Privilege Manager or by CyberArk? Click the Watch button to subscribe.

CyberArk
Vendor

subscribe