{"uuid": "ebb3cd82-9345-470b-825a-afabcccea67d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0914", "type": "seen", "source": "https://t.me/cvedetector/19062", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-0914 - \"Velociraptor VQL Shell Improper Access Control Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-0914 \nPublished : Feb. 27, 2025, 4:15 p.m. | 1\u00a0hour, 17\u00a0minutes ago \nDescription : An improper access control issue in the VQL shell feature in Velociraptor Versions &lt; 0.73.4 allowed authenticated users to execute the execve() plugin in deployments where this was explicitly forbidden by configuring the prevent_execve flag in the configuration file. This setting is not usually recommended and is uncommonly used, so this issue will only affect users who do set it. This issue is fixed in release 0.73.4. \nSeverity: 3.8 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-27T19:15:57.000000Z"}