In affected versions of Octopus Server error messages were handled unsafely on the error page. If an adversary could control any part of the error message they could embed code which may impact the user viewing the error message.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://advisories.octopus.com/post/2024/sa2025-04/ |
![]() ![]() |
History
Wed, 02 Jul 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Linux
Linux linux Kernel Microsoft Microsoft windows Octopus Octopus octopus Server |
|
CPEs | cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
Vendors & Products |
Linux
Linux linux Kernel Microsoft Microsoft windows Octopus Octopus octopus Server |
|
Metrics |
cvssV3_1
|
Tue, 11 Feb 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-79 | |
Metrics |
ssvc
|
Tue, 11 Feb 2025 10:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In affected versions of Octopus Server error messages were handled unsafely on the error page. If an adversary could control any part of the error message they could embed code which may impact the user viewing the error message. | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Octopus
Published:
Updated: 2025-02-11T14:41:18.275Z
Reserved: 2025-01-16T06:52:12.103Z
Link: CVE-2025-0513

Updated: 2025-02-11T14:41:12.414Z

Status : Analyzed
Published: 2025-02-11T11:15:15.817
Modified: 2025-07-02T17:24:18.387
Link: CVE-2025-0513

No data.