Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
5.9
Octopus Deploy: Unvalidated API Endpoint Allows File Deletion
CVE-2026-0704
Summary
An insecure API endpoint in Octopus Deploy allowed unauthorized changes to files on a host, potentially disrupting workflows. This was due to a lack of proper validation. Octopus Deploy users should update to a fixed version to prevent unintended file deletions.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| octopus | octopus_server | > 2023.1.4189 , <= 2025.3.14715 | – |
Original title
In affected version of Octopus Deploy it was possible to remove files and/or contents of files on the host using an API endpoint. The field lacked validation which could potentially result in ways ...
Original description
In affected version of Octopus Deploy it was possible to remove files and/or contents of files on the host using an API endpoint. The field lacked validation which could potentially result in ways to circumvent expected workflows.
nvd CVSS3.1
9.1
nvd CVSS4.0
5.9
Vulnerability type
CWE-22
Path Traversal
- https://advisories.octopus.com/post/2026/sa2026-01 Vendor Advisory
Published: 25 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026