VYPR
High severityNVD Advisory· Published Aug 2, 2024· Updated Aug 14, 2024

Harbor fails to validate the user permissions when updating project configurations

CVE-2024-22278

Description

Incorrect user permission validation in Harbor <v2.9.5 and Harbor <v2.10.3 allows authenticated users to modify configurations.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Harbor fails to validate maintainer role permissions for project configuration APIs, allowing authenticated users to modify configurations they should not be able to.

CVE-2024-22278 is an incorrect user permission validation vulnerability in Harbor, an open-source cloud-native registry. The flaw exists in the project configuration metadata API endpoints (PUT, POST, DELETE /projects/{project_name_or_id}/metadatas/{meta_name}) where the maintainer role's permissions are not properly validated [3]. This allows a user with the maintainer role to create, update, or delete project configurations, despite the maintainer role being intended to lack such configuration management capabilities [3].

To exploit this vulnerability, an attacker must be authenticated and granted the maintainer role for a specific project. The attacker can then send crafted requests to the metadata API to modify configurations within that project [3]. The attack is limited to the project for which the attacker has maintainer access, but it circumvents the intended permission boundaries.

The impact is that an authenticated maintainer can modify project configurations, potentially altering security settings, replication policies, or other project-level metadata. This could lead to unauthorized changes that affect the registry's behavior and security posture. The vulnerability is rated with a CVSS score (as per NVD) [2] and affects Harbor versions before 2.9.5 and 2.10.3 [4].

The vulnerability is patched in Harbor versions 2.9.5, 2.10.3, and 2.11.0 [3]. There are no known workarounds, so upgrading to a fixed version is recommended. The issue was reported by researchers from Palo Alto Networks [3].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/goharbor/harborGo
< 2.9.52.9.5
github.com/goharbor/harborGo
>= 2.10.0, < 2.10.32.10.3

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.