CVE-2026-5329

Rapid7 Velociraptor versions prior to 0.76.2 contain an improper input validation vulnerability in the client monitoring message handler on the Velociraptor server (primarily Linux) that allows an authenticated remote attacker to write to arbitrary internal server queues via a crafted monitoring message with a malicious queue name. The server handler that receives client monitoring messages does not sufficiently validate the queue name supplied by the client, allowing a rogue client to write arbitrary messages to privileged internal queues. This may lead to remote code execution on the Velociraptor server. Rapid7 Hosted Velociraptor instances are not affected by this vulnerability.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rapid7:velociraptor:*:*:*:*:*:*:*:*
cpe:2.3:a:rapid7:velociraptor:*:*:*:*:*:*:*:*

History

28 Apr 2026, 00:09

Type Values Removed Values Added
References () https://docs.velociraptor.app/announcements/advisories/cve-2026-5329/ - () https://docs.velociraptor.app/announcements/advisories/cve-2026-5329/ - Vendor Advisory
CWE NVD-CWE-noinfo
CPE cpe:2.3:a:rapid7:velociraptor:*:*:*:*:*:*:*:*
First Time Rapid7 velociraptor
Rapid7

09 Apr 2026, 18:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-09 18:17

Updated : 2026-04-28 00:09


NVD link : CVE-2026-5329

Mitre link : CVE-2026-5329

CVE.ORG link : CVE-2026-5329


JSON object : View

Products Affected

rapid7

  • velociraptor
CWE
CWE-20

Improper Input Validation

NVD-CWE-noinfo