CVE-2026-3236
Received Received - Intake
Privilege Escalation via API Key Lifetime Extension in Octopus Server

Publication date: 2026-03-05

Last updated on: 2026-03-13

Assigner: Octopus Deploy

Description
In affected versions of Octopus Server it was possible to create a new API key from an existing access token resulting in the new API key having a lifetime exceeding the original API key used to mint the access token.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-05
Last Modified
2026-03-13
Generated
2026-05-07
AI Q&A
2026-03-05
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
octopus octopus_server From 2023.1.4189 (inc) to 2025.3.14761 (exc)
octopus octopus_server From 2025.4.51 (inc) to 2025.4.10409 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-863 The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-3236 is a low-severity vulnerability in Octopus Server that allows an attacker to create a new API key from an existing access token.

The new API key created through this flaw has a lifetime that exceeds the original API key used to generate the access token, which is an incorrect authorization issue.

This affects multiple versions of Octopus Server prior to certain patched releases.


How can this vulnerability impact me? :

[{'type': 'paragraph', 'content': 'The vulnerability could allow an attacker with access to an existing access token to generate a new API key that remains valid longer than intended.'}, {'type': 'paragraph', 'content': "This extended lifetime of the new API key could potentially allow unauthorized access to the Octopus Server beyond the original key's expiration."}, {'type': 'paragraph', 'content': 'However, there have been no public reports or known exploitation of this vulnerability to date.'}] [1]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

There are no specific detection commands or methods provided to identify this vulnerability on your network or system.

The vulnerability involves the creation of a new API key from an existing access token with an extended lifetime, but no known detection tools or commands are mentioned.


What immediate steps should I take to mitigate this vulnerability?

The only effective mitigation is to upgrade Octopus Server to a fixed version.

  • Upgrade immediately to version 2025.4.10464 or higher.
  • If unable to upgrade to the latest version, upgrade at least to 2025.3.14761 for 2023.x, 2024.x, 2025.1.x, 2025.2.x, and 2025.3.x branches.
  • For 2025.4.x branches, upgrade at least to 2025.4.10409.

No other known mitigations exist besides upgrading to a patched version.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart