CVE-2025-13758: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Devolutions Server
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.
AI Analysis
Technical Summary
CVE-2025-13758 is a security vulnerability categorized under CWE-200, which involves the exposure of sensitive information to unauthorized actors. Specifically, this vulnerability affects Devolutions Server versions up to 2025.2.20 and 2025.3.8. The issue arises from the server unintentionally including credentials in certain requests, which can be intercepted or accessed by unauthorized users. The vulnerability requires network access (AV:N), low attack complexity (AC:L), and privileges (PR:L), along with user interaction (UI:R), meaning an attacker must have some level of access and trick a user into performing an action. The scope is unchanged (S:U), and the impact is limited to confidentiality (C:L) with no impact on integrity or availability. The CVSS 3.1 base score is 3.5, reflecting a low-severity issue. No public exploits have been reported yet, and no patches are linked at this time, indicating the vendor may still be addressing the issue. The vulnerability could allow attackers to obtain credentials that might be used for further lateral movement or privilege escalation within affected environments. Given the nature of Devolutions Server as a privileged access management and remote connection tool, exposure of credentials could have significant downstream effects if exploited.
Potential Impact
For European organizations, the exposure of credentials in Devolutions Server could lead to unauthorized access to sensitive systems or data, especially in environments relying heavily on this product for managing remote connections and privileged accounts. Although the direct impact is low severity, compromised credentials could facilitate more severe attacks such as lateral movement, data exfiltration, or ransomware deployment. Sectors like finance, government, and critical infrastructure that use Devolutions Server for secure access management are at higher risk. The vulnerability could undermine trust in access controls and increase the attack surface. However, the requirement for privileges and user interaction limits the ease of exploitation, reducing the immediate threat level. Organizations with strong network segmentation and monitoring may detect and contain exploitation attempts early.
Mitigation Recommendations
Organizations should monitor Devolutions' official channels for patches addressing CVE-2025-13758 and apply them promptly once available. Until patches are released, restrict network access to Devolutions Server to trusted users and systems only, employing network segmentation and firewall rules. Implement strict access controls and least privilege principles to limit the number of users with privileges that could be exploited. Educate users about social engineering risks to reduce the likelihood of successful user interaction exploitation. Enable detailed logging and monitoring on Devolutions Server to detect unusual request patterns or credential access attempts. Consider additional encryption or tokenization of credentials in transit and at rest if supported. Conduct regular security assessments and penetration tests focusing on privileged access management infrastructure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Switzerland
CVE-2025-13758: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Devolutions Server
Description
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.
AI-Powered Analysis
Technical Analysis
CVE-2025-13758 is a security vulnerability categorized under CWE-200, which involves the exposure of sensitive information to unauthorized actors. Specifically, this vulnerability affects Devolutions Server versions up to 2025.2.20 and 2025.3.8. The issue arises from the server unintentionally including credentials in certain requests, which can be intercepted or accessed by unauthorized users. The vulnerability requires network access (AV:N), low attack complexity (AC:L), and privileges (PR:L), along with user interaction (UI:R), meaning an attacker must have some level of access and trick a user into performing an action. The scope is unchanged (S:U), and the impact is limited to confidentiality (C:L) with no impact on integrity or availability. The CVSS 3.1 base score is 3.5, reflecting a low-severity issue. No public exploits have been reported yet, and no patches are linked at this time, indicating the vendor may still be addressing the issue. The vulnerability could allow attackers to obtain credentials that might be used for further lateral movement or privilege escalation within affected environments. Given the nature of Devolutions Server as a privileged access management and remote connection tool, exposure of credentials could have significant downstream effects if exploited.
Potential Impact
For European organizations, the exposure of credentials in Devolutions Server could lead to unauthorized access to sensitive systems or data, especially in environments relying heavily on this product for managing remote connections and privileged accounts. Although the direct impact is low severity, compromised credentials could facilitate more severe attacks such as lateral movement, data exfiltration, or ransomware deployment. Sectors like finance, government, and critical infrastructure that use Devolutions Server for secure access management are at higher risk. The vulnerability could undermine trust in access controls and increase the attack surface. However, the requirement for privileges and user interaction limits the ease of exploitation, reducing the immediate threat level. Organizations with strong network segmentation and monitoring may detect and contain exploitation attempts early.
Mitigation Recommendations
Organizations should monitor Devolutions' official channels for patches addressing CVE-2025-13758 and apply them promptly once available. Until patches are released, restrict network access to Devolutions Server to trusted users and systems only, employing network segmentation and firewall rules. Implement strict access controls and least privilege principles to limit the number of users with privileges that could be exploited. Educate users about social engineering risks to reduce the likelihood of successful user interaction exploitation. Enable detailed logging and monitoring on Devolutions Server to detect unusual request patterns or credential access attempts. Consider additional encryption or tokenization of credentials in transit and at rest if supported. Conduct regular security assessments and penetration tests focusing on privileged access management infrastructure.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- DEVOLUTIONS
- Date Reserved
- 2025-11-26T20:34:39.022Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69287327a95a569c55dd13ed
Added to database: 11/27/2025, 3:49:59 PM
Last enriched: 12/4/2025, 4:02:41 PM
Last updated: 1/12/2026, 2:27:21 AM
Views: 85
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0852: SQL Injection in code-projects Online Music Site
MediumCVE-2026-0851: SQL Injection in code-projects Online Music Site
MediumCVE-2026-0850: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2025-68493: CWE-112 Missing XML Validation in Apache Software Foundation Apache Struts
UnknownCVE-2025-15506: Out-of-Bounds Read in AcademySoftwareFoundation OpenColorIO
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.