Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://advisories.octopus.com/post/2026/sa2026-02 |
|
Thu, 16 Apr 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | API Key Lifetime Abuse via Access Token in Octopus Server |
Fri, 13 Mar 2026 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Fri, 06 Mar 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Octopus
Octopus octopus Server |
|
| Vendors & Products |
Octopus
Octopus octopus Server |
Thu, 05 Mar 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In affected versions of Octopus Server it was possible to create a new API key from an existing access token resulting in the new API key having a lifetime exceeding the original API key used to mint the access token. | |
| Weaknesses | CWE-863 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Octopus
Published:
Updated: 2026-03-05T14:17:07.392Z
Reserved: 2026-02-26T00:25:55.210Z
Link: CVE-2026-3236
No data.
Status : Analyzed
Published: 2026-03-05T11:15:54.400
Modified: 2026-03-13T01:30:06.483
Link: CVE-2026-3236
No data.
OpenCVE Enrichment
Updated: 2026-04-16T12:30:06Z