Skip to main content

CVE-2025-10761: Improper Restriction of Excessive Authentication Attempts in Harness

Medium
VulnerabilityCVE-2025-10761cvecve-2025-10761
Published: Sun Sep 21 2025 (09/21/2025, 03:02:08 UTC)
Source: CVE Database V5
Product: Harness

Description

A vulnerability has been found in Harness 3.3.0. Affected is an unknown function of the file /api/v1/login of the component Login Endpoint. The manipulation leads to improper restriction of excessive authentication attempts. Remote exploitation of the attack is possible. The attack is considered to have high complexity. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/21/2025, 03:32:57 UTC

Technical Analysis

CVE-2025-10761 is a vulnerability identified in Harness version 3.3.0 affecting the login endpoint (/api/v1/login). The core issue is an improper restriction of excessive authentication attempts, which means the system does not adequately limit the number of login attempts an attacker can make. This flaw can be exploited remotely without requiring authentication or user interaction, although the attack complexity is high and exploitability is considered difficult. The vulnerability allows an attacker to perform brute-force or credential stuffing attacks more effectively, potentially leading to unauthorized access if valid credentials are guessed or obtained. The vulnerability has been publicly disclosed, but no patch or vendor response has been provided yet. The CVSS 4.0 base score is 6.3 (medium severity), reflecting network attack vector, high attack complexity, no privileges or user interaction required, and low impact on confidentiality, integrity, and availability. The lack of proper throttling or lockout mechanisms on the login API endpoint is the root cause, which can facilitate automated attacks against user accounts. Although no known exploits are currently in the wild, the public disclosure increases the risk of exploitation attempts. This vulnerability is particularly relevant for organizations relying on Harness 3.3.0 for CI/CD or deployment automation, as compromised credentials could lead to unauthorized access to critical infrastructure or deployment pipelines.

Potential Impact

For European organizations using Harness 3.3.0, this vulnerability poses a risk of unauthorized access through brute-force attacks on the login endpoint. Successful exploitation could allow attackers to gain access to deployment pipelines or automation workflows, potentially leading to unauthorized code deployments, data leakage, or disruption of services. Given the medium severity and high complexity, the immediate risk is moderate but could escalate if combined with other vulnerabilities or weak credential hygiene. Organizations in sectors with high regulatory requirements (e.g., finance, healthcare, critical infrastructure) could face compliance issues or reputational damage if breaches occur. The lack of vendor response and patch availability increases the window of exposure, emphasizing the need for proactive mitigation. Additionally, the remote and unauthenticated nature of the attack vector means that attackers do not need prior access, increasing the threat surface. However, the low impact on confidentiality, integrity, and availability as per CVSS suggests that the vulnerability alone may not lead to full system compromise but could be a stepping stone for further attacks.

Mitigation Recommendations

1. Implement external rate limiting and account lockout policies on the login endpoint to restrict excessive authentication attempts. 2. Deploy Web Application Firewalls (WAFs) with rules to detect and block brute-force patterns targeting /api/v1/login. 3. Enforce strong password policies and encourage multi-factor authentication (MFA) for all user accounts to reduce the risk of credential compromise. 4. Monitor authentication logs for unusual patterns indicative of brute-force or credential stuffing attacks. 5. Isolate or segment the Harness deployment environment to limit lateral movement in case of account compromise. 6. Regularly update and patch Harness once a vendor fix is released; meanwhile, consider upgrading to a non-affected version if available. 7. Conduct security awareness training for users on credential security and phishing risks. 8. If possible, restrict login API access by IP whitelisting or VPN to reduce exposure. 9. Employ anomaly detection systems to alert on abnormal login behaviors. These steps go beyond generic advice by focusing on compensating controls and monitoring strategies until an official patch is available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-20T07:05:11.193Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68cf6e624a0b186b932318d7

Added to database: 9/21/2025, 3:17:54 AM

Last enriched: 9/21/2025, 3:32:57 AM

Last updated: 9/21/2025, 3:32:57 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats