No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://advisories.octopus.com/post/2026/sa2026-03 |
|
Wed, 08 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Octopus Server API endpoint allows low‑privileged users to alter signing key expiration |
Tue, 07 Apr 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Tue, 24 Mar 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Octopus Server API endpoint allows low‑privileged users to alter signing key expiration |
Tue, 17 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-285 | |
| Metrics |
ssvc
|
Tue, 17 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Octopus
Octopus octopus Server |
|
| Vendors & Products |
Octopus
Octopus octopus Server |
Tue, 17 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In affected versions of Octopus Server it was possible for a low privileged user to manipulate an API request to change the signing key expiration and revocation time frames via an API endpoint that had incorrect permission validation. It was not possible to expose the signing keys using this vulnerability. | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Octopus
Published:
Updated: 2026-03-17T13:20:24.029Z
Reserved: 2026-02-26T00:26:01.068Z
Link: CVE-2026-3237
Updated: 2026-03-17T13:20:14.956Z
Status : Analyzed
Published: 2026-03-17T07:16:03.610
Modified: 2026-04-07T01:00:20.390
Link: CVE-2026-3237
No data.
OpenCVE Enrichment
Updated: 2026-04-08T20:01:32Z