Harbor fails to validate user permissions while Viewing, updating and deleting Webhook policies
Description
Harbor fails to validate user permissions while deleting Webhook policies, allowing malicious users to view, update and delete Webhook policies of other users. The attacker could modify Webhook policies configured in other projects.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Harbor fails to validate user permissions on Webhook policy endpoints, allowing unauthorized read, update, and delete of policies across projects.
Vulnerability
Harbor, an open-source cloud native registry, does not enforce proper authorization checks on several Webhook policy API endpoints. The GET, PUT, and DELETE operations on /projects/{project_name_or_id}/webhook/policies/{webhook_policy_id} lack validation that the requesting user has the necessary permissions for the project associated with the policy. This oversight means any authenticated user can interact with Webhook policies in projects they do not own or have explicit access to [1][3][4].
Exploitation
An attacker with valid Harbor credentials can exploit these missing permission checks by crafting API requests that target Webhook policies in other projects. For example, sending a GET request with varying webhook_policy_id values can disclose sensitive policy details and credentials [3]. Similarly, PUT requests allow the attacker to modify Webhook configurations, and DELETE requests can remove policies belonging to other users [1][4]. No special administrative privileges are required beyond basic authentication.
Impact
Successful exploitation enables an attacker to read, alter, or delete Webhook policies across projects. This could lead to unauthorized disclosure of webhook credentials and URLs, disruption of automated workflows that rely on webhook notifications, and potential redirection of webhook events to attacker-controlled endpoints for further compromise [1][3][4].
Mitigation
The vulnerability is addressed in Harbor version 2.5.2 and later. Users should upgrade to this or a subsequent release as soon as possible. No workarounds are available [3][4].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/goharbor/harborGo | >= 1.0.0, < 1.10.13 | 1.10.13 |
github.com/goharbor/harborGo | >= 2.0.0, < 2.4.3 | 2.4.3 |
github.com/goharbor/harborGo | >= 2.5.0, < 2.5.2 | 2.5.2 |
Affected products
3- Harbor/Harbordescription
- osv-coords2 versions
>= 2.0.0, < 2.4.3+ 1 more
- (no CPE)range: >= 2.0.0, < 2.4.3
- (no CPE)range: >= 1.0.0, < 1.10.13
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.