CVE-2026-3236
Privilege Escalation via API Key Lifetime Extension in Octopus Server
Publication date: 2026-03-05
Last updated on: 2026-03-13
Assigner: Octopus Deploy
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| octopus | octopus_server | From 2023.1.4189 (inc) to 2025.3.14761 (exc) |
| octopus | octopus_server | From 2025.4.51 (inc) to 2025.4.10409 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-863 | The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-3236 is a low-severity vulnerability in Octopus Server that allows an attacker to create a new API key from an existing access token.
The new API key created through this flaw has a lifetime that exceeds the original API key used to generate the access token, which is an incorrect authorization issue.
This affects multiple versions of Octopus Server prior to certain patched releases.
How can this vulnerability impact me? :
[{'type': 'paragraph', 'content': 'The vulnerability could allow an attacker with access to an existing access token to generate a new API key that remains valid longer than intended.'}, {'type': 'paragraph', 'content': "This extended lifetime of the new API key could potentially allow unauthorized access to the Octopus Server beyond the original key's expiration."}, {'type': 'paragraph', 'content': 'However, there have been no public reports or known exploitation of this vulnerability to date.'}] [1]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
There are no specific detection commands or methods provided to identify this vulnerability on your network or system.
The vulnerability involves the creation of a new API key from an existing access token with an extended lifetime, but no known detection tools or commands are mentioned.
What immediate steps should I take to mitigate this vulnerability?
The only effective mitigation is to upgrade Octopus Server to a fixed version.
- Upgrade immediately to version 2025.4.10464 or higher.
- If unable to upgrade to the latest version, upgrade at least to 2025.3.14761 for 2023.x, 2024.x, 2025.1.x, 2025.2.x, and 2025.3.x branches.
- For 2025.4.x branches, upgrade at least to 2025.4.10409.
No other known mitigations exist besides upgrading to a patched version.