Velociraptor Authentication Bypass via query() Plugin
Velociraptor versions prior to 0.76.3 contain an authentication bypass vulnerability in the query() plugin, allowing authenticated users to access data from other organizations within the Velociraptor deployment, potentially leading to unauthorized data access and privilege escalation.
Velociraptor, a powerful open-source endpoint detection and response (EDR) framework, is vulnerable to an authentication bypass issue affecting versions prior to 0.76.3. The vulnerability, identified as CVE-2026-6290, resides within the query() plugin. A user with valid credentials and access to one organization within Velociraptor can leverage the query() plugin from a notebook cell to execute VQL (Velociraptor Query Language) queries against other organizations, irrespective of their explicit permissions in those other organizations. This occurs because the plugin improperly uses the user’s current ACL token for all queries, effectively granting the user the same level of access across all organizations as they have in their primary organization. This vulnerability allows for potentially broad data exfiltration and privilege escalation within a Velociraptor deployment.
Attack Chain
- An attacker gains valid credentials for a user account within one organization in a vulnerable Velociraptor instance (version < 0.76.3).
- The attacker logs into the Velociraptor GUI.
- The attacker creates a new notebook or modifies an existing one.
- Within a notebook cell, the attacker uses the
query()plugin with a crafted VQL query designed to access data from a different organization. For example, usingSELECT * FROM org_id='TARGET_ORG'. - The Velociraptor server processes the query using the attacker’s existing ACL token, bypassing the organization’s access controls.
- The server returns data from the target organization to the attacker.
- The attacker analyzes the retrieved data, potentially gaining access to sensitive information or identifying further targets within the compromised Velociraptor instance.
- The attacker uses the information gathered to perform actions in other organizations, based on the permissions of their initial account.
Impact
Successful exploitation of CVE-2026-6290 could allow an attacker to gain unauthorized access to sensitive data stored within different organizations managed by the same Velociraptor instance. This could lead to the exfiltration of confidential information, potential privilege escalation within targeted organizations, and a compromise of the overall security posture of the affected environment. The severity is compounded by the fact that it’s a logic error within a security product, making it harder to detect and remediate without patching. The CVSS v3.1 score is 8.0 HIGH, indicating a significant risk.
Recommendation
- Immediately upgrade all Velociraptor installations to version 0.76.3 or later to patch CVE-2026-6290.
- Prioritize reviewing Velociraptor user accounts and their assigned organizational access to identify potentially compromised accounts.
- Deploy the Sigma rule provided in this brief to detect anomalous use of the
query()plugin that targets different organizations than the user’s primary organization. - Monitor Velociraptor server logs for any unexpected access patterns or data retrieval attempts originating from the
query()plugin.
Detection coverage 2
Detect Cross-Organization Query() Plugin Usage
highDetects usage of the Velociraptor query() plugin to target different organizations than the user's primary organization.
Detect Velociraptor Notebook VQL Execution Targeting Multiple Orgs
mediumDetects VQL queries executed via Velociraptor notebooks that attempt to access data from multiple organizations, indicative of potential unauthorized data access.
Detection queries are kept inside the platform. Get full rules →