The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-6863

CVE-2026-6863: Velociraptor Auth Bypass Vulnerability

CVE-2026-6863 is an authorization bypass flaw in Velociraptor versions prior to 0.76.4 that allows low-privileged users to access files across organizations. This post covers technical details, affected versions, and mitigations.

Published: May 7, 2026

CVE-2026-6863 Overview

CVE-2026-6863 is a cross-organization authorization bypass in the Velociraptor HTTP API affecting versions prior to 0.76.4. A user holding only the reader role in the root organization can issue a single authenticated HTTP GET request to read files belonging to any other organization. The bypass works even when the user has no explicit permissions in the target organization. The flaw is classified as [CWE-863: Incorrect Authorization]. The reverse direction is not affected: users with read access in a sub-organization cannot access the root organization or other sub-organizations.

Critical Impact

Authenticated users with the lowest privilege role (READ_RESULTS) in the root organization can read arbitrary files across all tenant organizations, breaking multi-tenant isolation.

Affected Products

  • Velociraptor versions prior to 0.76.4
  • Velociraptor HTTP API endpoint
  • Multi-tenant Velociraptor deployments using sub-organizations

Discovery Timeline

  • 2026-05-06 - CVE-2026-6863 published to NVD
  • 2026-05-06 - Last updated in NVD database

Technical Details for CVE-2026-6863

Vulnerability Analysis

Velociraptor supports a multi-tenant deployment model in which a root organization can host multiple sub-organizations. Each organization is expected to enforce isolation through role-based access control. Roles such as reader carry a minimal permission set, with READ_RESULTS being the lowest authenticated capability.

The HTTP API fails to validate the target organization context when serving file read requests. An authenticated user in the root organization can include parameters that direct the request toward another organization. The API processes the request using the caller's root-level role rather than verifying explicit permission in the target organization. The result is unauthorized cross-tenant file disclosure through a single GET request.

The asymmetry of the flaw indicates the issue is specific to how root-org authentication is propagated. Sub-organization users are correctly restricted, while root-org users inherit unintended cross-org access.

Root Cause

The root cause is missing authorization scoping on file read endpoints in the HTTP API. The server consults the caller's role within the root organization but does not re-evaluate authorization against the target organization referenced in the request. This is a classic [CWE-863] flaw where a security check is performed against the wrong principal-resource pair.

Attack Vector

Exploitation requires valid authenticated credentials with the reader role or higher in the root organization. The attacker issues an HTTP GET request to the Velociraptor API and references files owned by another organization. The server returns the file contents without enforcing per-org permissions. No user interaction or local access is required. Refer to the Velociraptor Security Advisory for endpoint-level technical details.

Detection Methods for CVE-2026-6863

Indicators of Compromise

  • HTTP GET requests from low-privilege root-org accounts that reference org_id or organization parameters belonging to other tenants
  • API access logs showing reader-role users retrieving files outside their assigned organization scope
  • Spikes in READ_RESULTS operations originating from root-org reader accounts targeting cross-tenant resources

Detection Strategies

  • Audit Velociraptor HTTP API access logs for any read operation in which the caller's primary organization differs from the target file's owning organization
  • Correlate authenticated user role with the organization ID referenced in each API request to flag mismatches
  • Baseline normal access patterns for reader-role accounts and alert on deviations involving foreign organization identifiers

Monitoring Recommendations

  • Forward Velociraptor server logs to a central SIEM and apply rules that match cross-organization access by users with only READ_RESULTS
  • Track historical reader-role activity and review any retroactive evidence of cross-tenant reads prior to upgrade
  • Monitor authentication events for new or seldom-used reader accounts that suddenly enumerate organizations or files

How to Mitigate CVE-2026-6863

Immediate Actions Required

  • Upgrade all Velociraptor server instances to version 0.76.4 or later
  • Review existing role assignments in the root organization and remove unnecessary reader accounts
  • Audit historical API logs for cross-organization read activity prior to patching
  • Rotate any sensitive artifacts or credentials that may have been exposed through cross-tenant file reads

Patch Information

The fix is included in Velociraptor 0.76.4. The vendor advisory is published at the Velociraptor Security Advisory. Operators running multi-tenant deployments should treat upgrade as the primary remediation path, since no configuration change fully closes the authorization gap on unpatched versions.

Workarounds

  • Restrict authenticated access to the Velociraptor HTTP API to trusted networks or VPN endpoints until the patch is applied
  • Temporarily remove or downgrade unneeded root-organization reader accounts to limit the population of users able to exploit the bypass
  • Segment multi-tenant data so that highly sensitive collections do not reside in environments shared with the root organization until upgrade is complete
bash
# Verify Velociraptor server version and upgrade
velociraptor version
# Upgrade to fixed release
# Download the 0.76.4 (or later) binary from the official release channel
# and replace the running server binary, then restart the service
systemctl restart velociraptor_server

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechVelociraptor

  • SeverityMEDIUM

  • CVSS Score6.8

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-863
  • Technical References
  • Velociraptor Security Advisory
  • Related CVEs
  • CVE-2026-7573: Velociraptor Auth Bypass Vulnerability

  • CVE-2026-6290: Velociraptor Auth Bypass Vulnerability

  • CVE-2025-0914: Velociraptor Auth Bypass Vulnerability

  • CVE-2026-7572: Velocidex Velociraptor DoS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the Most Advanced Cybersecurity Platform

See how the world’s most intelligent, autonomous cybersecurity platform can protect your organization today and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English