<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Goharbor — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/goharbor/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 25 Mar 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/goharbor/feed.xml" rel="self" type="application/rss+xml"/><item><title>GoHarbor Harbor v2.15.0 and Below Vulnerable to Hardcoded Credentials</title><link>https://feed.craftedsignal.io/briefs/2026-03-goharbor-hardcoded-creds/</link><pubDate>Wed, 25 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-goharbor-hardcoded-creds/</guid><description>GoHarbor Harbor version 2.15.0 and below is vulnerable to the use of hard-coded credentials, allowing an attacker to use the default password and gain unauthorized access to the web UI.</description><content:encoded><![CDATA[<p>GoHarbor Harbor, a popular open-source cloud native registry, is susceptible to a critical vulnerability (CVE-2026-4404) in versions 2.15.0 and below. This flaw stems from the use of hardcoded credentials, specifically a default password, which, if unchanged, allows unauthorized access to the web UI. An attacker exploiting this vulnerability can bypass authentication and potentially gain full control over the Harbor instance. This poses a significant risk to organizations using affected Harbor versions, as it can lead to data breaches, container image tampering, and other malicious activities. The vulnerability was reported in March 2026, and defenders should prioritize upgrading or mitigating affected instances.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a GoHarbor Harbor instance running version 2.15.0 or below.</li>
<li>Attacker accesses the web UI login page of the Harbor instance.</li>
<li>Attacker enters the default username (&ldquo;admin&rdquo;) and password (&ldquo;Harbor12345&rdquo;), as documented in the official GoHarbor documentation.</li>
<li>The Harbor instance authenticates the attacker due to the use of default credentials.</li>
<li>Attacker gains access to the Harbor web UI with administrator privileges.</li>
<li>Attacker can now manage container images, repositories, and users within the Harbor instance.</li>
<li>Attacker may pull sensitive images, inject malicious code into existing images, or create new malicious images.</li>
<li>The attacker uses the now compromised Harbor instance to distribute malicious container images throughout the organization&rsquo;s infrastructure, leading to widespread compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to gain complete control over a GoHarbor Harbor instance. This can lead to the compromise of container images, potentially injecting malware into the software supply chain. The impact could range from data exfiltration and service disruption to full system compromise, depending on the privileges associated with the Harbor instance. Given the widespread use of GoHarbor in cloud-native environments, this vulnerability presents a significant risk to numerous organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade GoHarbor Harbor instances to a version greater than 2.15.0 to remediate CVE-2026-4404.</li>
<li>If upgrading is not immediately feasible, change the default &ldquo;admin&rdquo; password (&ldquo;Harbor12345&rdquo;) to a strong, unique password as outlined in the GoHarbor documentation.</li>
<li>Deploy the provided Sigma rule to detect login attempts using the default credentials against the Harbor web UI based on webserver logs.</li>
<li>Regularly review and update credentials for all services and applications to prevent the exploitation of default or hardcoded passwords.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>vulnerability</category><category>hardcoded-credentials</category><category>goharbor</category></item></channel></rss>