Virtual System Administrator Kaseya Virtual System Administrator

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Kaseya Virtual System Administrator.

By the Year

In 2026 there have been 0 vulnerabilities in Kaseya Virtual System Administrator. Last year, in 2025 Virtual System Administrator had 1 security vulnerability published. Right now, Virtual System Administrator is on track to have less security vulnerabilities in 2026 than it did last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 1 0.00
2024 0 0.00
2023 0 0.00
2022 0 0.00
2021 0 0.00
2020 0 0.00
2019 2 8.65

It may take a day or so for new Virtual System Administrator vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Kaseya Virtual System Administrator Security Vulnerabilities

Kaseya KServer RCE via File Upload (<6.3.0.2)
CVE-2013-10034 - July 31, 2025

An unrestricted file upload vulnerability exists in Kaseya KServer versions prior to 6.3.0.2. The uploadImage.asp endpoint allows unauthenticated users to upload files to arbitrary paths via a crafted filename parameter in a multipart/form-data POST request. Due to the lack of authentication and input sanitation, an attacker can upload a file with an .asp extension to a web-accessible directory, which can then be invoked to execute arbitrary code with the privileges of the IUSR account. The vulnerability enables remote code execution without prior authentication and was resolved in version 6.3.0.2 by removing the vulnerable uploadImage.asp endpoint.

Unrestricted File Upload

An issue was discovered in Kaseya Virtual System Administrator (VSA) through 9.4.0.37
CVE-2019-15506 7.5 - High - August 26, 2019

An issue was discovered in Kaseya Virtual System Administrator (VSA) through 9.4.0.37. It has a critical information disclosure vulnerability. An unauthenticated attacker can send properly formatted requests to the web application and download sensitive files and information. For example, the /DATAREPORTS directory can be farmed for reports. Because this directory contains the results of reports such as NMAP, Patch Status, and Active Directory domain metadata, an attacker can easily collect this critical information and parse it for information. There are a number of directories affected.

Information Disclosure

Kaseya VSA RMM before R9.3 9.3.0.35, R9.4 before 9.4.0.36, and R9.5 before 9.5.0.5
CVE-2018-20753 9.8 - Critical - February 05, 2019

Kaseya VSA RMM before R9.3 9.3.0.35, R9.4 before 9.4.0.36, and R9.5 before 9.5.0.5 allows unprivileged remote attackers to execute PowerShell payloads on all managed devices. In January 2018, attackers actively exploited this vulnerability in the wild.

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Kaseya Virtual System Administrator or by Kaseya? Click the Watch button to subscribe.

Kaseya
Vendor

subscribe