Skip to main content

CVE-2025-30086: n/a

Medium
VulnerabilityCVE-2025-30086cvecve-2025-30086
Published: Fri Jul 25 2025 (07/25/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CNCF Harbor 2.13.x before 2.13.1 and 2.12.x before 2.12.4 allows information disclosure by administrators who can exploit an ORM Leak present in the /api/v2.0/users endpoint to leak users' password hash and salt values. The q URL parameter allows a user to filter users by any column, and filter password=~ could be abused to leak out a user's password hash character by character. An attacker with administrator access could exploit this to leak highly sensitive information stored in the Harbor database. All endpoints that support the q URL parameter are vulnerable to this ORM leak attack.

AI-Powered Analysis

AILast updated: 07/25/2025, 14:47:54 UTC

Technical Analysis

CVE-2025-30086 is a vulnerability affecting CNCF Harbor versions 2.13.x prior to 2.13.1 and 2.12.x prior to 2.12.4. Harbor is a popular open-source container image registry that stores and serves container images, widely used in cloud-native environments. The vulnerability arises from an Object-Relational Mapping (ORM) leak in the /api/v2.0/users endpoint. Specifically, the q URL parameter allows filtering users by any column, including the password field. An attacker with administrator privileges can exploit this flaw by crafting queries such as filter password=~ to extract password hashes and salt values character by character. This side-channel style information disclosure enables the attacker to reconstruct sensitive credential data stored in the Harbor database. Since all endpoints supporting the q parameter are vulnerable, the attack surface extends beyond just the users endpoint. The vulnerability requires administrative access to Harbor, which means the attacker must already have elevated privileges within the system. However, once exploited, it can lead to the compromise of user credentials, potentially enabling lateral movement or privilege escalation within the container registry environment. No CVSS score has been assigned yet, and there are no known exploits in the wild at the time of publication. The flaw was reserved in March 2025 and published in July 2025, indicating recent discovery and disclosure. No official patches or mitigations are linked in the provided data, but the fixed versions are 2.13.1 and 2.12.4, implying that upgrading to these or later versions will remediate the issue.

Potential Impact

For European organizations, this vulnerability poses a significant risk to container image security and overall cloud-native infrastructure integrity. Harbor is widely adopted in Europe due to the region's strong emphasis on cloud-native technologies and container orchestration platforms like Kubernetes. An attacker exploiting this vulnerability can obtain password hashes and salts of Harbor users, potentially cracking them offline to gain unauthorized access. This can lead to unauthorized image uploads, downloads, or deletions, disrupting CI/CD pipelines, software supply chains, and production environments. The exposure of credential data also increases the risk of lateral movement within corporate networks, potentially affecting other critical systems. Given the GDPR and other stringent data protection regulations in Europe, any compromise involving user credentials and sensitive infrastructure data can result in severe compliance violations, financial penalties, and reputational damage. The requirement for administrator access limits the threat to insiders or attackers who have already breached perimeter defenses, but the severity remains high due to the sensitive nature of the leaked information and the critical role Harbor plays in container security.

Mitigation Recommendations

European organizations should immediately upgrade affected Harbor instances to versions 2.13.1 or 2.12.4 or later, where this vulnerability is patched. Until upgrades can be performed, organizations should restrict administrator access to Harbor to a minimal set of trusted personnel and enforce strong multi-factor authentication (MFA) to reduce the risk of credential compromise. Monitoring and auditing Harbor API usage, especially queries involving the q parameter, can help detect suspicious activity indicative of exploitation attempts. Network segmentation should be applied to isolate Harbor instances from less trusted network zones. Additionally, organizations should rotate Harbor user credentials and any associated secrets after patching to mitigate potential credential exposure. Implementing strict role-based access control (RBAC) policies within Harbor can limit the number of users with administrator privileges, reducing the attack surface. Finally, organizations should keep abreast of official Harbor security advisories and apply patches promptly to address any future related vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-03-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6883958dad5a09ad0050e722

Added to database: 7/25/2025, 2:32:45 PM

Last enriched: 7/25/2025, 2:47:54 PM

Last updated: 7/26/2025, 1:04:14 PM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats