Severe SQL Injection Vulnerability Exposes Sensitive Data in Devolutions Server

Published:

spot_img

Recent Vulnerabilities in Devolutions Server: What You Need to Know

Organizations relying on Devolutions Server for managing privileged accounts and sensitive authentication data are facing a series of newly identified vulnerabilities. These weaknesses could significantly compromise data integrity and security.

Overview of the Security Advisory

Devolutions has issued a security advisory, marked as DEVO-2025-0018, highlighting multiple vulnerabilities within its platform. Among these, a critical issue stands out, allowing unauthorized access to confidential data stored in the system’s database.

The advisory indicates that several versions of Devolutions Server—specifically 2025.2.20 and earlier, as well as 2025.3.8 and earlier—are susceptible to these vulnerabilities.

A Critical SQL Injection Flaw

The most alarming vulnerability (rated 9.4 out of 10 on the CVSS 4.0 scale) pertains to SQL injection found in the platform’s “last usage logs.” This flaw arises from how the system sorts usage history via a parameter called DateSortField. Due to insufficient validation of user input, an authenticated user could exploit this weakness to inject malicious SQL commands into the database.

This vulnerability, cataloged as CVE-2025-13757, enables an attacker to extract or alter sensitive information, posing a grave risk particularly for environments where critical credentials and access keys are stored. Its potential to expose sensitive data makes it one of the most serious vulnerabilities reported for Devolutions Server. The flaw was discovered by JaGoTu from DCIT a.s.

Additional Medium-Severity Vulnerabilities

In addition to the critical SQL injection issue, researchers identified two other vulnerabilities classified as medium severity—CVE-2025-13758 and CVE-2025-13765. While these are less critical, they still pose a real threat to organizations that maintain strict data confidentiality.

CVE-2025-13758: Leakage of Credentials

The first medium-severity vulnerability relates to certain entry types that improperly expose passwords in initial requests for general item information. Typically, credentials should only be accessed through a secure /sensitive-data request. In this case, however, some entries prematurely leaked credential information, increasing the risk of unauthorized disclosure. This issue carries a CVSS score of 5.1 and affects the same product versions noted in the advisory.

CVE-2025-13765: Flawed Access Control in Email Service Configuration

The second vulnerability, rated at 4.9 on the CVSS scale, involves improper access controls in the email service configuration API. Users lacking administrative privileges could still access email service passwords if multiple services were set up, undermining the platform’s intended access control measures. Both vulnerabilities are also credited to JaGoTu from DCIT a.s.

Immediate Action Required: Updates and Remediation

To mitigate these vulnerabilities, Devolutions strongly urges customers to implement the latest security updates without delay. The recommended versions for Devolutions Server are:

  • Version 2025.2.21 or higher
  • Version 2025.3.9 or higher

The urgency of applying these patches cannot be overstated. Failure to do so leaves organizations vulnerable to SQL injection attacks, unauthorized exposure of credentials, and lapses in access control.

The vulnerabilities posed by CVE-2025-13757, CVE-2025-13758, and CVE-2025-13765 underline the necessity for immediate patching across affected systems. Unresolved, these vulnerabilities can lead to significant breaches of confidentiality and operational risk.

Organizations are advised to not only apply the necessary updates promptly but also to enhance their vulnerability monitoring efforts. Tools like Cyble, which provide real-time intelligence on vulnerabilities, can assist security teams in identifying potential threats sooner, thereby reducing exposure.

Stay Proactive in Security

To keep your organization safe, see potential vulnerabilities before they can be exploited. Consider booking a personalized demo with Cyble for real-time visibility into critical risks and high-impact threats that may threaten your enterprise.

spot_img

Related articles

Recent articles

Broadcom Honors 2025 Partners for Innovation and Execution Excellence

Broadcom Honors 2025 Partners for Innovation and Execution Excellence Broadcom has announced its annual awards recognizing outstanding contributions from its software partners across various business...

Nigeria Adopts First National Policy to Strengthen Cosmetics Safety After Two Decades of Delays

Nigeria Adopts First National Policy to Strengthen Cosmetics Safety After Two Decades of Delays Nigeria has officially approved its inaugural national policy on cosmetics safety...

UAE Classrooms Strengthen Learning Outcomes by Blending Digital Innovation with Print Resources

UAE Classrooms Strengthen Learning Outcomes by Blending Digital Innovation with Print Resources Study Highlights Importance of Technology in Education A recent study conducted in the UAE...

Finland Faces Intensified Cyber Espionage Threats from Russia and China Targeting Technology Sector

Finland Faces Intensified Cyber Espionage Threats from Russia and China Targeting Technology Sector Finland is confronting an escalating intelligence challenge as cyber espionage from Russia...