Description

Rapid7 Velociraptor versions prior to 0.76.2 contain an improper input validation vulnerability in the client monitoring message handler on the Velociraptor server (primarily Linux) that allows an authenticated remote attacker to write to arbitrary internal server queues via a crafted monitoring message with a malicious queue name. The server handler that receives client monitoring messages does not sufficiently validate the queue name supplied by the client, allowing a rogue client to write arbitrary messages to privileged internal queues. This may lead to remote code execution on the Velociraptor server. Rapid7 Hosted Velociraptor instances are not affected by this vulnerability.

INFO

Published Date :

2026-04-09T17:52:05.885Z

Last Modified :

2026-04-10T03:56:08.816Z

Source :

rapid7
AFFECTED PRODUCTS

The following products are affected by CVE-2026-5329 vulnerability.

Vendors Products
Rapid7
  • Velociraptor
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-5329.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact