Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0610: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Devolutions Server

0
Critical
VulnerabilityCVE-2026-0610cvecve-2026-0610cwe-89
Published: Mon Jan 19 2026 (01/19/2026, 14:31:13 UTC)
Source: CVE Database V5
Vendor/Project: Devolutions
Product: Server

Description

CVE-2026-0610 is a critical SQL Injection vulnerability affecting Devolutions Server versions 2025. 3. 1 through 2025. 3. 12. It allows unauthenticated remote attackers to execute arbitrary SQL commands via the remote-sessions component, potentially compromising confidentiality, integrity, and availability of the server. The vulnerability has a CVSS score of 9. 8, indicating high exploitability without user interaction or privileges. Although no known exploits are currently reported in the wild, the risk is significant due to the critical nature of the flaw. European organizations using Devolutions Server for remote session management are at risk of data breaches, service disruption, and unauthorized access.

AI-Powered Analysis

AILast updated: 01/26/2026, 20:08:49 UTC

Technical Analysis

CVE-2026-0610 is a critical SQL Injection vulnerability identified in the remote-sessions component of Devolutions Server, specifically affecting versions 2025.3.1 through 2025.3.12. The vulnerability arises from improper neutralization of special elements in SQL commands (CWE-89), allowing an unauthenticated attacker to inject malicious SQL code remotely. This can lead to unauthorized data access, modification, or deletion, as well as potential full compromise of the underlying database and server. The CVSS 3.1 score of 9.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, with no authentication or user interaction required and low attack complexity. Devolutions Server is widely used for managing remote sessions and credentials, making this vulnerability particularly dangerous as it could expose sensitive credentials and session data. Although no public exploits are currently known, the vulnerability's characteristics make it a prime candidate for exploitation once weaponized. The lack of available patches at the time of disclosure increases the urgency for organizations to implement interim mitigations and monitor for suspicious activity. This vulnerability underscores the importance of secure coding practices in handling SQL inputs and the need for timely vulnerability management in critical remote access infrastructure.

Potential Impact

For European organizations, the impact of CVE-2026-0610 can be severe. Devolutions Server is often used in enterprise environments to manage remote sessions and credentials, meaning exploitation could lead to unauthorized access to sensitive systems and data. Confidentiality breaches could expose personal data protected under GDPR, leading to regulatory penalties and reputational damage. Integrity violations could result in unauthorized changes to critical configurations or data, disrupting business operations. Availability impacts could arise from denial-of-service conditions or destructive database commands, affecting continuity of services. Sectors such as finance, healthcare, government, and critical infrastructure that rely heavily on secure remote access are particularly vulnerable. The ability for unauthenticated attackers to exploit this vulnerability remotely increases the risk of widespread attacks, including ransomware or espionage campaigns targeting European entities. The absence of known exploits currently provides a window for proactive defense, but the high severity score demands immediate action to prevent potential exploitation.

Mitigation Recommendations

1. Immediate application of official patches from Devolutions once released is critical; monitor vendor communications closely. 2. Until patches are available, restrict network access to Devolutions Server instances using firewalls and VPNs to limit exposure to trusted hosts only. 3. Implement strict input validation and parameterized queries if custom integrations with the server exist. 4. Enable detailed logging and monitoring of database queries and remote session activities to detect anomalous behavior indicative of SQL injection attempts. 5. Conduct regular security assessments and penetration testing focused on remote session management components. 6. Employ Web Application Firewalls (WAFs) with SQL injection detection capabilities to provide an additional layer of defense. 7. Review and minimize privileges of the database accounts used by Devolutions Server to limit potential damage from exploitation. 8. Educate IT and security teams about the vulnerability and response procedures to ensure rapid incident handling.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
DEVOLUTIONS
Date Reserved
2026-01-05T16:11:38.393Z
Cvss Version
null
State
PUBLISHED

Threat ID: 696e462dd302b072d9c86a47

Added to database: 1/19/2026, 2:56:45 PM

Last enriched: 1/26/2026, 8:08:49 PM

Last updated: 2/4/2026, 11:53:21 AM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats