Delinea Cloud Suite and Privileged Access Service – HTTP Request Smuggling vulnerability - CVE-2025-12811

Trust Center

ControlK

Security is built into our bones
Delinea’s Privileged Access Management solutions are built with security as a foundation from the start. We adhere to industry standards and frameworks, and ensure security testing is performed as a critical component of our software development processes along with continuous Quality Assurance (QA) checks.

Our cybersecurity defense measures address key components, including intrusion detection, Distributed denial-of-service (DDoS) attack prevention, penetration testing, behavioral analytics, anomaly detection, machine learning, and Security Operations Center. We also monitor and protect against critical web application security risks incorporating OWASP Top 10 and Automated Top 20 threats.

Encryption assured for data in transit and at rest
Customer data is fully isolated and encrypted both in transit and at rest, using the AES-256 standard encryption algorithm and PBKDF2-HMAC-SHA256 hashing algorithm. Delinea uses private encryption keys for each customer, with third-party key management support (AWS KMS). Secrets are systematically “salted” before being hashed and encrypted with their own unique Initialization Vector and Key.

Connections to Delinea cloud services are protected via Transport Layer Security (TLS). Distributed Engine communications are also secured with an additional encryption key unique to each tenant.

Documents

DOCUMENTS2024 CAIQ
Data Processing Addendum (DPA)
EU – US Data Privacy Framework (DPF)
Privacy Policy
View more
Trust Center Updates

Delinea Cloud Suite and Privileged Access Service – HTTP Request Smuggling vulnerability - CVE-2025-12811

Copy link
Vulnerabilities

Improper Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') in Delinea Inc. Cloud Suite and Privileged Access Service.

If you're not using the latest Server Suite agents, this fix requires that you upgrade to Server Suite 2023.1 (agent 6.0.1) or later. If you cannot upgrade to Release 2023.1 (agent version 6.0.1) or later, you can choose one of the following versions: Server Suite release 2023.0.5 (agent version 6.0.0-158), or Server Suite release 2022.1.10 (agent version 5.9.1-337).

Affected Product and Version

Delinea Cloud Suite and Privileged Access Service version 25.1 HF4 and earlier

Resolution

Upgrade to version 25.1 HF5 or later

CVE Details

  • CVE ID: CVE-2025-12811
  • Published Date: Februrary 18, 2026
  • Vulnerability Type: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
  • CWE: 444
  • CVSS v4.0 Score: 6.9
  • CVSS v4.0 Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

Delinea Cloud Suite and Privileged Access Service – SQL Injection vulnerability - CVE-2025-12812

Vulnerabilities

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Delinea Inc. Cloud Suite and Privileged Access Service.

Remediation: This issue is fixed in Cloud Suite: 25.1

Affected Product and Version

Delinea Cloud Suite and Privileged Access Service version 23.1.2 and earlier

Resolution

Upgrade to Cloud Suite version 25.1 or later

CVE Details

  • CVE ID: CVE-2025-12812
  • Published Date: February 18, 2026
  • Vulnerability Type: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
  • CWE: 89
  • CVSS v4.0 Score: 5.3
  • CVSS v4.0 Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

Delinea Secret Server Dump - 3rd Party Script Advisory

Vulnerabilities

We are aware of a publicly available script that references Secret Server. This script does not exploit any new or active vulnerability within the product.  Instead, it attempts to decrypt secrets from environments where the user running it must have administrative access to both the application server and its databases.

Secret Server on-premises is delivered as an application. Delinea continuously assesses and addresses vulnerabilities across all supported components. While Delinea is responsible for maintaining the security of the application, customers are responsible for securing and hardening the environments in which they deploy and host Secret Server. Administrator access to the application server on which Secret Server on-premise is hosted provides full management control over the application. This means that if an attacker gains this level of control, they could obtain both the database data and the encryption key, which enables decryption of secrets.  Preventing unauthorized access to the hosting environment is therefore of utmost importance. To secure your configuration we recommend following security best practices such as the CIS Critical Security Controls, as well as :

  • Use EFS (Encrypting File System)
  • Use HSM (Hardware Security Module) that meets HSM Security Assessment Level 2
  • Use DPAPI to encrypt the encryption.config file (this does not protect from the use of the tool, but does provide additional security in case the file is retrieved from backup and decryption is performed on a different machine)
  • Use DoubleLock
  • Protect and restrict access to the local admin account and the service account that runs Secret Server on the application server
  • Protect underlying infrastructure on which Secret Server is hosted.

Note: Secret Server Cloud is not directly impacted by this issue. Please see these documentation sections for more information:
 • https://docs.delinea.com/online-help/secret-server/security-hardening/hardening-guides/security-hardening-guide/index.htm#Database
https://docs.delinea.com/online-help/secret-server/security-hardening/hardening-guides/security-hardening-guide/index.htm#ApplicationServer
https://docs.delinea.com/online-help/secret-server/security-hardening/hardening-guides/security-hardening-guide/index.htm#ApplicationSettings
https://www.cisecurity.org/controls

Delinea Secret Server on-prem RPC Password Rotation authentication vulnerability - CVE-2025-12810

Vulnerabilities

Improper Authentication vulnerability in Delinea Inc. Secret Server On-Prem (RPC Password Rotation modules).

This issue affects Secret Server On-Prem: 11.8.1, 11.9.6, 11.9.25.
A secret with "change password on check in" enabled automatically checks in even when the password change fails after reaching its retry limit. This leaves the secret in an inconsistent state with the wrong password.

Affected Product and Version

Delinea Secret Server on-prem versions 11.8.1, 11.9.6, and 11.9.25

Resolution

Upgrade to Secret Server version 11.9.47 or later

The secret will remain checked out when the password change fails.

CVE Details

  • CVE ID: CVE-2025-12810
  • Published Date: January 27, 2026
  • Vulnerability Type: Improper Authentication
  • CWE: 287
  • CVSS v4.0 Score: 5.3
  • CVSS v4.0 Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/AU:Y/R:A

Delinea Platform achieves PCI-DSS compliance

Compliance

Delinea Platform has achieved PCI DSS 4.0.1 compliance, ensuring adherence to industry-recognized security requirements for payment data. Supporting documentation can be found by clicking on PCI-DSS in the Compliance section.

If you need help using this Trust Center, please contact us.
Contact support
If you think you may have discovered a vulnerability, please send us a note.
Report issue