In affected versions of Octopus Server it was possible to create a new API key from an existing access token resulting in the new API key having a lifetime exceeding the original API key used to mint the access token.
References
| Link | Resource |
|---|---|
| https://advisories.octopus.com/post/2026/sa2026-02 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
13 Mar 2026, 01:30
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| First Time |
Octopus
Octopus octopus Server |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
| References | () https://advisories.octopus.com/post/2026/sa2026-02 - Vendor Advisory | |
| CPE | cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:* |
05 Mar 2026, 11:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-05 11:15
Updated : 2026-03-13 01:30
NVD link : CVE-2026-3236
Mitre link : CVE-2026-3236
CVE.ORG link : CVE-2026-3236
JSON object : View
Products Affected
octopus
- octopus_server
CWE
CWE-863
Incorrect Authorization
