Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13758: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Devolutions Server

0
Low
VulnerabilityCVE-2025-13758cvecve-2025-13758cwe-200
Published: Thu Nov 27 2025 (11/27/2025, 15:30:47 UTC)
Source: CVE Database V5
Vendor/Project: Devolutions
Product: Server

Description

Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

AI-Powered Analysis

AILast updated: 12/04/2025, 16:02:41 UTC

Technical Analysis

CVE-2025-13758 is a security vulnerability categorized under CWE-200, which involves the exposure of sensitive information to unauthorized actors. Specifically, this vulnerability affects Devolutions Server versions up to 2025.2.20 and 2025.3.8. The issue arises from the server unintentionally including credentials in certain requests, which can be intercepted or accessed by unauthorized users. The vulnerability requires network access (AV:N), low attack complexity (AC:L), and privileges (PR:L), along with user interaction (UI:R), meaning an attacker must have some level of access and trick a user into performing an action. The scope is unchanged (S:U), and the impact is limited to confidentiality (C:L) with no impact on integrity or availability. The CVSS 3.1 base score is 3.5, reflecting a low-severity issue. No public exploits have been reported yet, and no patches are linked at this time, indicating the vendor may still be addressing the issue. The vulnerability could allow attackers to obtain credentials that might be used for further lateral movement or privilege escalation within affected environments. Given the nature of Devolutions Server as a privileged access management and remote connection tool, exposure of credentials could have significant downstream effects if exploited.

Potential Impact

For European organizations, the exposure of credentials in Devolutions Server could lead to unauthorized access to sensitive systems or data, especially in environments relying heavily on this product for managing remote connections and privileged accounts. Although the direct impact is low severity, compromised credentials could facilitate more severe attacks such as lateral movement, data exfiltration, or ransomware deployment. Sectors like finance, government, and critical infrastructure that use Devolutions Server for secure access management are at higher risk. The vulnerability could undermine trust in access controls and increase the attack surface. However, the requirement for privileges and user interaction limits the ease of exploitation, reducing the immediate threat level. Organizations with strong network segmentation and monitoring may detect and contain exploitation attempts early.

Mitigation Recommendations

Organizations should monitor Devolutions' official channels for patches addressing CVE-2025-13758 and apply them promptly once available. Until patches are released, restrict network access to Devolutions Server to trusted users and systems only, employing network segmentation and firewall rules. Implement strict access controls and least privilege principles to limit the number of users with privileges that could be exploited. Educate users about social engineering risks to reduce the likelihood of successful user interaction exploitation. Enable detailed logging and monitoring on Devolutions Server to detect unusual request patterns or credential access attempts. Consider additional encryption or tokenization of credentials in transit and at rest if supported. Conduct regular security assessments and penetration tests focusing on privileged access management infrastructure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
DEVOLUTIONS
Date Reserved
2025-11-26T20:34:39.022Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69287327a95a569c55dd13ed

Added to database: 11/27/2025, 3:49:59 PM

Last enriched: 12/4/2025, 4:02:41 PM

Last updated: 1/12/2026, 2:27:21 AM

Views: 85

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats