Velociraptor Rapid7 Velociraptor

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Rapid7 Velociraptor.

Known Exploited Rapid7 Velociraptor Vulnerabilities

The following Rapid7 Velociraptor vulnerabilities have been marked by CISA as Known to be Exploited by threat actors.

Title Description Added
Rapid7 Velociraptor Incorrect Default Permissions Vulnerability Rapid7 Velociraptor contains an incorrect default permissions vulnerability that can lead to arbitrary command execution and endpoint takeover. To successfully exploit this vulnerability the user must already have access to collect artifacts from the endpoint.
CVE-2025-6264 Exploit Probability: 0.1%
October 14, 2025

By the Year

In 2026 there have been 1 vulnerability in Rapid7 Velociraptor with an average score of 8.5 out of ten. Last year, in 2025 Velociraptor had 2 security vulnerabilities published. If vulnerabilities keep coming in at the current rate, it appears that number of security vulnerabilities in Velociraptor in 2026 could surpass last years number. However, the average CVE base score of the vulnerabilities in 2026 is greater by 2.35.




Year Vulnerabilities Average Score
2026 1 8.50
2025 2 6.15
2024 1 0.00
2023 4 6.13
2022 3 5.43
2021 1 4.80

It may take a day or so for new Velociraptor vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Rapid7 Velociraptor Security Vulnerabilities

Rapid7 Velociraptor <0.76.2: Input Val Flaw in Monitoring Msg Handler
CVE-2026-5329 8.5 - High - April 09, 2026

Rapid7 Velociraptor versions prior to 0.76.2 contain an improper input validation vulnerability in the client monitoring message handler on the Velociraptor server (primarily Linux) that allows an authenticated remote attacker to write to arbitrary internal server queues via a crafted monitoring message with a malicious queue name. The server handler that receives client monitoring messages does not sufficiently validate the queue name supplied by the client, allowing a rogue client to write arbitrary messages to privileged internal queues. This may lead to remote code execution on the Velociraptor server. Rapid7 Hosted Velociraptor instances are not affected by this vulnerability.

Improper Input Validation

Rapid7 Velociraptor versions before 0.75.6 contain a directory traversal issue on Linux servers
CVE-2025-14728 6.8 - Medium - December 29, 2025

Rapid7 Velociraptor versions before 0.75.6 contain a directory traversal issue on Linux servers that allows a rogue client to upload a file which is written outside the datastore directory. Velociraptor is normally only allowed to write in the datastore directory. The issue occurs due to insufficient sanitization of directory names which end with a ".", only encoding the final "." AS "%2E". Although files can be written to incorrect locations, the containing directory must end with "%2E". This limits the impact of this vulnerability, and prevents it from overwriting critical files.

Directory traversal

Velociraptor Artifact Perm Bypass Allows Arbitrary Cmd Exec
CVE-2025-6264 5.5 - Medium - June 20, 2025

Velociraptor allows collection of VQL queries packaged into Artifacts from endpoints. These artifacts can be used to do anything and usually run with elevated permissions.  To limit access to some dangerous artifact, Velociraptor allows for those to require high permissions like EXECVE to launch. The Admin.Client.UpdateClientConfig is an artifact used to update the client's configuration. This artifact did not enforce an additional required permission, allowing users with COLLECT_CLIENT permissions (normally given by the "Investigator" role) to collect it from endpoints and update the configuration. This can lead to arbitrary command execution and endpoint takeover. To successfully exploit this vulnerability the user must already have access to collect artifacts from the endpoint (i.e. have the COLLECT_CLIENT given typically by the "Investigator' role).

Incorrect Default Permissions

Velociraptor MSI Installer WRITE_DACL PrivEsc
CVE-2024-10526 - November 07, 2024

Rapid7 Velociraptor MSI Installer versions below 0.73.3 suffer from a vulnerability whereby it creates the installation directory with WRITE_DACL permission to the BUILTIN\\Users group. This allows local users who are not administrators to grant themselves the Full Control permission on Velociraptor's files. By modifying Velociraptor's files, local users can subvert the binary and cause the Velociraptor service to execute arbitrary code as the SYSTEM user, or to replace the Velociraptor binary completely.  This issue is fixed in version 0.73.3.

Velociraptor 0.7.0-4 Reflected XSS in Error Path Rapid7
CVE-2023-5950 6.1 - Medium - November 06, 2023

Rapid7 Velociraptor versions prior to 0.7.0-4 suffer from a reflected cross site scripting vulnerability. This vulnerability allows attackers to inject JS into the error path, potentially leading to unauthorized execution of scripts within a user's web browser. This vulnerability is fixed in version 0.7.0-04 and a patch is available to download. Patches are also available for version 0.6.9 (0.6.9-1).

XSS

Crash via PE/OLE Parsing in Rapid7 Velociraptor <0.6.8
CVE-2023-2226 5.3 - Medium - April 21, 2023

Due to insufficient validation in the PE and OLE parsers in Rapid7's Velociraptor versions earlier than 0.6.8 allows attacker to crash Velociraptor during parsing of maliciously malformed files.  For this attack to succeed, the attacker needs to be able to introduce malicious files to the system at the same time that Velociraptor attempts to collect any artifacts that attempt to parse PE files, Authenticode signatures, or OLE files. After crashing, the Velociraptor service will restart and it will still be possible to collect other artifacts.

Out-of-bounds Read

Velociraptor <0.6.7-5: Client ID Directory Traversal in CreateCollection API
CVE-2023-0290 4.3 - Medium - January 18, 2023

Rapid7 Velociraptor did not properly sanitize the client ID parameter to the CreateCollection API, allowing a directory traversal in where the collection task could be written. It was possible to provide a client id of "../clients/server" to schedule the collection for the server (as a server artifact), but only require privileges to schedule collections on the client. Normally, to schedule an artifact on the server, the COLLECT_SERVER permission is required. This permission is normally only granted to "administrator" role. Due to this issue, it is sufficient to have the COLLECT_CLIENT privilege, which is normally granted to the "investigator" role. To exploit this vulnerability, the attacker must already have a Velociraptor user account at least "investigator" level, and be able to authenticate to the GUI and issue an API call to the backend. Typically, most users deploy Velociraptor with limited access to a trusted group, and most users will already be administrators within the GUI. This issue affects Velociraptor versions before 0.6.7-5. Version 0.6.7-5, released January 16, 2023, fixes the issue.

Directory traversal

Velociraptor 0.6.7-5 Privilege Escalation via VQL copy() File Overwrite
CVE-2023-0242 8.8 - High - January 18, 2023

Rapid7 Velociraptor allows users to be created with different privileges on the server. Administrators are generally allowed to run any command on the server including writing arbitrary files. However, lower privilege users are generally forbidden from writing or modifying files on the server. The VQL copy() function applies permission checks for reading files but does not check for permission to write files. This allows a low privilege user (usually, users with the Velociraptor "investigator" role) to overwrite files on the server, including Velociraptor configuration files. To exploit this vulnerability, the attacker must already have a Velociraptor user account at a low privilege level (at least "analyst") and be able to log into the GUI and create a notebook where they can run the VQL query invoking the copy() VQL function. Typically, most users deploy Velociraptor with limited access to a trusted group (most users will be administrators within the GUI). This vulnerability is associated with program files https://github.Com/Velocidex/velociraptor/blob/master/vql/filesystem/copy.go https://github.Com/Velocidex/velociraptor/blob/master/vql/filesystem/copy.go and program routines copy(). This issue affects Velociraptor versions before 0.6.7-5. Version 0.6.7-5, released January 16, 2023, fixes the issue.

AuthZ

Velociraptor 0.6.5-2: GUI XSS via unsanitized description field
CVE-2022-35632 4.8 - Medium - July 29, 2022

The Velociraptor GUI contains an editor suggestion feature that can display the description field of a VQL function, plugin or artifact. This field was not properly sanitized and can lead to cross-site scripting (XSS). This issue was resolved in Velociraptor 0.6.5-2.

XSS

XSS in Velociraptor 0.6.5-2 collection report generator
CVE-2022-35630 6.1 - Medium - July 29, 2022

A cross-site scripting (XSS) issue in generating a collection report made it possible for malicious clients to inject JavaScript code into the static HTML file. This issue was resolved in Velociraptor 0.6.5-2.

XSS

Velociraptor ID Spoofing via Client ID Claim Before 0.6.5
CVE-2022-35629 5.4 - Medium - July 29, 2022

Due to a bug in the handling of the communication between the client and server, it was possible for one client, already registered with their own client ID, to send messages to the server claiming to come from another client ID. This issue was resolved in Velociraptor 0.6.5-2.

Authentication Bypass by Spoofing

Rapid7 Velociraptor 0.5.9 and prior is vulnerable to a post-authentication persistent cross-site scripting (XSS) issue
CVE-2021-3619 4.8 - Medium - July 22, 2021

Rapid7 Velociraptor 0.5.9 and prior is vulnerable to a post-authentication persistent cross-site scripting (XSS) issue, where an authenticated user could abuse MIME filetype sniffing to embed executable code on a malicious upload. This issue was fixed in version 0.6.0. Note that login rights to Velociraptor is nearly always reserved for trusted and verified users with IT security backgrounds.

XSS

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Rapid7 Velociraptor or by Rapid7? Click the Watch button to subscribe.

Rapid7
Vendor

subscribe