CVE-2025-0525

7.5 HIGH

📋 TL;DR

This vulnerability in Octopus Server allows attackers to use the preview import feature to determine whether specific files exist on the target system. This information disclosure could help adversaries plan further attacks by revealing the presence of sensitive files. Organizations running affected versions of Octopus Server are at risk.

💻 Affected Systems

Products:
  • Octopus Server
Versions: All versions before the fix
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The preview import feature must be enabled, which is typically the default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could map the entire file system, identify sensitive configuration files, credentials, or backup files, and use this information to launch targeted attacks leading to full system compromise.

🟠

Likely Case

Attackers would use this to confirm the existence of specific files they suspect might contain sensitive information, then attempt to access those files through other means or plan targeted attacks.

🟢

If Mitigated

With proper network segmentation and access controls, the impact is limited to information disclosure about file existence without actual file access.

🌐 Internet-Facing: HIGH - Internet-facing Octopus Servers are directly accessible to attackers who can probe for file existence without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could still exploit this to gather reconnaissance data for lateral movement.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of the preview import feature and ability to craft appropriate requests. No authentication bypass is involved.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific fixed versions

Vendor Advisory: https://advisories.octopus.com/post/2024/sa2025-02/

Restart Required: No

Instructions:

1. Review the vendor advisory for specific fixed versions. 2. Update Octopus Server to the latest patched version. 3. Verify the update completed successfully.

🔧 Temporary Workarounds

Disable Preview Import Feature

all

Temporarily disable the preview import functionality until patching can be completed.

Navigate to Octopus Server Configuration -> Features -> Disable 'Preview Import'

🧯 If You Can't Patch

  • Implement strict network access controls to limit Octopus Server exposure
  • Monitor and alert on unusual preview import activity patterns

🔍 How to Verify

Check if Vulnerable:

Check your Octopus Server version against the affected versions listed in the vendor advisory.

Check Version:

Check Octopus Server web interface or configuration files for version information

Verify Fix Applied:

After updating, verify the preview import feature no longer leaks file existence information by testing with controlled requests.

📡 Detection & Monitoring

Log Indicators:

  • Unusual volume of preview import requests
  • Preview import requests for suspicious file paths
  • Failed preview import attempts for non-existent sensitive files

Network Indicators:

  • HTTP requests to preview import endpoints with file path parameters
  • Pattern of sequential file path probing

SIEM Query:

source="octopus_server" AND (event="preview_import" OR uri_path="/api/import/preview") AND file_path CONTAINS sensitive_terms

🔗 References

📤 Share & Export