Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3563: CWE-1289 Improper validation of unsafe equivalence in input in Devolutions PowerShell Universal

0
Medium
VulnerabilityCVE-2026-3563cvecve-2026-3563cwe-1289
Published: Tue Mar 17 2026 (03/17/2026, 19:15:37 UTC)
Source: CVE Database V5
Vendor/Project: Devolutions
Product: PowerShell Universal

Description

Improper input validation in the apps and endpoints configuration in PowerShell Universal before 2026.1.4 allows an authenticated user with permissions to create or modify Apps or Endpoints to override existing application or system routes, resulting in unintended request routing and denial of service via a conflicting URL path.

AI-Powered Analysis

AILast updated: 03/17/2026, 20:04:13 UTC

Technical Analysis

CVE-2026-3563 is a security vulnerability identified in Devolutions PowerShell Universal, specifically affecting versions prior to 2026.1.4. The root cause is improper validation of unsafe equivalence in input, classified under CWE-1289. This flaw exists in the apps and endpoints configuration management, where an authenticated user with the ability to create or modify Apps or Endpoints can override existing application or system routes by submitting conflicting URL paths. This improper input validation allows the attacker to cause unintended request routing, which can disrupt normal application behavior and lead to denial of service (DoS) conditions. The vulnerability does not appear to allow remote code execution or privilege escalation but can severely impact availability and integrity of routing within the affected system. Exploitation requires authenticated access with specific permissions, limiting the attack surface to authorized users or insiders. No public exploits have been reported to date, but the vulnerability is publicly disclosed and patched in version 2026.1.4. The lack of a CVSS score necessitates an assessment based on impact and exploitability factors. The vulnerability highlights the importance of strict input validation and route management in web-based administrative tools like PowerShell Universal, which is widely used for automation and orchestration in enterprise environments.

Potential Impact

The primary impact of CVE-2026-3563 is on the availability and integrity of applications managed by PowerShell Universal. By overriding existing routes, an attacker can redirect legitimate requests to unintended endpoints or cause conflicts that result in denial of service. This can disrupt automation workflows, administrative operations, and potentially critical business processes relying on PowerShell Universal. Organizations with complex automation environments may experience operational downtime or degraded service quality. Although the vulnerability requires authenticated access with specific permissions, insider threats or compromised accounts could exploit this flaw to cause significant disruption. The inability to properly validate route inputs also raises concerns about potential future exploitation vectors if combined with other vulnerabilities. Since PowerShell Universal is used globally in IT environments for automation, the impact could be widespread, affecting enterprise IT operations, cloud management, and DevOps pipelines.

Mitigation Recommendations

To mitigate CVE-2026-3563, organizations should: 1) Immediately restrict permissions for creating or modifying Apps or Endpoints in PowerShell Universal to only trusted administrators. 2) Monitor and audit changes to app and endpoint configurations to detect unauthorized or suspicious modifications. 3) Apply the official patch or upgrade to PowerShell Universal version 2026.1.4 or later as soon as it becomes available. 4) Implement multi-factor authentication and strong access controls to reduce the risk of credential compromise for users with modification privileges. 5) Use network segmentation and firewall rules to limit access to the PowerShell Universal management interfaces. 6) Conduct regular security reviews of automation and orchestration tools to identify and remediate configuration weaknesses. 7) Consider implementing runtime monitoring to detect anomalous routing behavior or denial of service conditions caused by conflicting URL paths. These steps go beyond generic advice by focusing on permission management, proactive monitoring, and timely patching specific to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
DEVOLUTIONS
Date Reserved
2026-03-04T19:53:50.594Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69b9aedc771bdb1749d151fd

Added to database: 3/17/2026, 7:43:24 PM

Last enriched: 3/17/2026, 8:04:13 PM

Last updated: 3/18/2026, 5:22:27 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses