<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-6290 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-6290/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 15 Apr 2026 18:17:25 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-6290/feed.xml" rel="self" type="application/rss+xml"/><item><title>Velociraptor Authentication Bypass via query() Plugin</title><link>https://feed.craftedsignal.io/briefs/2026-04-velociraptor-auth-bypass/</link><pubDate>Wed, 15 Apr 2026 18:17:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-velociraptor-auth-bypass/</guid><description>Velociraptor versions prior to 0.76.3 contain an authentication bypass vulnerability in the query() plugin, allowing authenticated users to access data from other organizations within the Velociraptor deployment, potentially leading to unauthorized data access and privilege escalation.</description><content:encoded><![CDATA[<p>Velociraptor, a powerful open-source endpoint detection and response (EDR) framework, is vulnerable to an authentication bypass issue affecting versions prior to 0.76.3. The vulnerability, identified as CVE-2026-6290, resides within the <code>query()</code> plugin.  A user with valid credentials and access to one organization within Velociraptor can leverage the <code>query()</code> plugin from a notebook cell to execute VQL (Velociraptor Query Language) queries against other organizations, irrespective of their explicit permissions in those other organizations. This occurs because the plugin improperly uses the user&rsquo;s current ACL token for all queries, effectively granting the user the same level of access across all organizations as they have in their primary organization. This vulnerability allows for potentially broad data exfiltration and privilege escalation within a Velociraptor deployment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains valid credentials for a user account within one organization in a vulnerable Velociraptor instance (version &lt; 0.76.3).</li>
<li>The attacker logs into the Velociraptor GUI.</li>
<li>The attacker creates a new notebook or modifies an existing one.</li>
<li>Within a notebook cell, the attacker uses the <code>query()</code> plugin with a crafted VQL query designed to access data from a different organization. For example, using <code>SELECT * FROM org_id='TARGET_ORG'</code>.</li>
<li>The Velociraptor server processes the query using the attacker&rsquo;s existing ACL token, bypassing the organization&rsquo;s access controls.</li>
<li>The server returns data from the target organization to the attacker.</li>
<li>The attacker analyzes the retrieved data, potentially gaining access to sensitive information or identifying further targets within the compromised Velociraptor instance.</li>
<li>The attacker uses the information gathered to perform actions in other organizations, based on the permissions of their initial account.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6290 could allow an attacker to gain unauthorized access to sensitive data stored within different organizations managed by the same Velociraptor instance.  This could lead to the exfiltration of confidential information, potential privilege escalation within targeted organizations, and a compromise of the overall security posture of the affected environment. The severity is compounded by the fact that it&rsquo;s a logic error within a security product, making it harder to detect and remediate without patching. The CVSS v3.1 score is 8.0 HIGH, indicating a significant risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade all Velociraptor installations to version 0.76.3 or later to patch CVE-2026-6290.</li>
<li>Prioritize reviewing Velociraptor user accounts and their assigned organizational access to identify potentially compromised accounts.</li>
<li>Deploy the Sigma rule provided in this brief to detect anomalous use of the <code>query()</code> plugin that targets different organizations than the user&rsquo;s primary organization.</li>
<li>Monitor Velociraptor server logs for any unexpected access patterns or data retrieval attempts originating from the <code>query()</code> plugin.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>velociraptor</category><category>authentication bypass</category><category>privilege escalation</category><category>cve-2026-6290</category></item></channel></rss>