VYPR
High severityNVD Advisory· Published Nov 14, 2024· Updated Nov 14, 2024

Harbor fails to validate user permissions while Viewing, updating and deleting Webhook policies

CVE-2022-31666

Description

Harbor fails to validate user permissions while deleting Webhook policies, allowing malicious users to view, update and delete Webhook policies of other users.  The attacker could modify Webhook policies configured in other projects.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Harbor fails to validate user permissions on Webhook policy endpoints, allowing unauthorized read, update, and delete of policies across projects.

Vulnerability

Harbor, an open-source cloud native registry, does not enforce proper authorization checks on several Webhook policy API endpoints. The GET, PUT, and DELETE operations on /projects/{project_name_or_id}/webhook/policies/{webhook_policy_id} lack validation that the requesting user has the necessary permissions for the project associated with the policy. This oversight means any authenticated user can interact with Webhook policies in projects they do not own or have explicit access to [1][3][4].

Exploitation

An attacker with valid Harbor credentials can exploit these missing permission checks by crafting API requests that target Webhook policies in other projects. For example, sending a GET request with varying webhook_policy_id values can disclose sensitive policy details and credentials [3]. Similarly, PUT requests allow the attacker to modify Webhook configurations, and DELETE requests can remove policies belonging to other users [1][4]. No special administrative privileges are required beyond basic authentication.

Impact

Successful exploitation enables an attacker to read, alter, or delete Webhook policies across projects. This could lead to unauthorized disclosure of webhook credentials and URLs, disruption of automated workflows that rely on webhook notifications, and potential redirection of webhook events to attacker-controlled endpoints for further compromise [1][3][4].

Mitigation

The vulnerability is addressed in Harbor version 2.5.2 and later. Users should upgrade to this or a subsequent release as soon as possible. No workarounds are available [3][4].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/goharbor/harborGo
>= 1.0.0, < 1.10.131.10.13
github.com/goharbor/harborGo
>= 2.0.0, < 2.4.32.4.3
github.com/goharbor/harborGo
>= 2.5.0, < 2.5.22.5.2

Affected products

3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.