Overview
This report discusses a serious vulnerability in Devolutions Server, designated as CVE-2025-6741. This vulnerability, if exploited, can compromise data and system integrity by allowing unauthorized access to sensitive information via the secure message entry attachment feature. The vulnerability impacts both businesses and individual users utilizing affected versions of Devolutions Server, underscoring the urgency of its mitigation.
Vulnerability Summary
CVE ID: CVE-2025-6741
Severity: High (7.7 CVSS Score)
Attack Vector: Network
Privileges Required: Low (Authenticated User)
User Interaction: Required
Impact: Unauthorized access to sensitive data, potential system compromise
Affected Products
Escape the Surveillance Era
Most apps won’t tell you the truth.
They’re part of the problem.
Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.
Ameeba Chat gives you a way out.
- • No phone number
- • No email
- • No personal info
- • Anonymous aliases
- • End-to-end encrypted
Chat without a trace.
Product | Affected Versions
Devolutions Server | 2025.2.2.0 through 2025.2.4.0
Devolutions Server | 2025.1.11.0 and earlier
How the Exploit Works
The vulnerability arises from an improper access control mechanism in the secure message component of Devolutions Server. An authenticated user could exploit this vulnerability by sending a specially crafted request to the secure message entry attachment feature. By doing so, they could gain unauthorized access to sensitive data, leading to potential system compromise or data leakage.
Conceptual Example Code
POST /secure_message/attachment_entry HTTP/1.1
Host: target.example.com
Authorization: Bearer {user_token}
{
"entry_id": "{unauthorized_entry_id}",
"attachment_data": "{malicious_payload}"
}
In this conceptual example, an authenticated user sends a POST request to the `attachment_entry` endpoint of the `secure_message` component. The user includes an `entry_id` for an entry to which they do not have legitimate access, and `attachment_data` that represents a malicious payload. This unauthorized action is made possible due to the improper access control mechanism in place.

