Skip to main content
Mallory

High-Severity Flaws Expose Harbor to Default-Password Access and N2WS to RCE

default-credential-exposurewidely-deployed-product-advisoryinternet-facing-service-vulnerabilitycloud-service-vulnerability
Updated March 25, 2026 at 07:50 PM2 sources
Share:
High-Severity Flaws Expose Harbor to Default-Password Access and N2WS to RCE

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Two high-severity vulnerabilities were disclosed affecting widely used infrastructure software. GoHarbor Harbor is affected by CVE-2026-4404, a hard-coded/default credential issue in version 2.15.0 and below that can let attackers authenticate to the Harbor web UI with the default administrator password if it was never changed. The published scoring indicates the flaw is network-accessible, requires no privileges or user interaction, and can lead to high confidentiality and integrity impact.

N2WS Backup & Recovery is affected by CVE-2025-32991, which impacts versions before 4.4.0 and can lead to remote code execution through a two-step attack against the product’s RESTful API. The CVSS v3.1 vector rates the issue as remotely exploitable with no required privileges or user interaction, despite high attack complexity, and assigns high impact across confidentiality, integrity, and availability. The CVE entry was updated with links to an N2WS security advisory and vendor resources.

Timeline

  1. Mar 25, 2026

    CVE-2025-32991 updated with CVSS, CWE, and advisory references

    The CVE-2025-32991 record was updated to add a CVSS v3.1 vector, classify the issue as CWE-362, and include references to an N2WS security advisory update and the N2WS website.

  2. Mar 25, 2026

    CVE-2025-32991 disclosed for N2WS Backup & Recovery RCE

    A CVE entry for CVE-2025-32991 was received for N2WS Backup & Recovery versions before 4.4.0, describing a two-step attack against the product's RESTful API that can result in remote code execution.

  3. Mar 23, 2026

    CVE-2026-4404 record updated with CVSS and CWE details

    Later the same day, the CVE-2026-4404 record was modified to add CVSS v3.1 scoring and CWE mappings, characterizing the flaw as network-accessible, low complexity, and requiring no privileges or user interaction.

  4. Mar 23, 2026

    CVE-2026-4404 published for Harbor default admin password issue

    A new CVE, CVE-2026-4404, was published for GoHarbor Harbor 2.15.0 and earlier, describing a hard-coded/default credential weakness that allows authentication to the Harbor web UI if the default administrator password was not changed.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Sources

Related Stories

Hard-Coded Credentials Flaw in GoHarbor Harbor Triggers Patch Warning

Hard-Coded Credentials Flaw in GoHarbor Harbor Triggers Patch Warning

CERT/CC published advisory `VU#577436` for a hard-coded credentials vulnerability in **GoHarbor Harbor**, identifying a security flaw that could expose deployments using the container registry platform. The issue was classified as a vulnerability in Harbor itself, with the advisory highlighting the presence of embedded credentials that could undermine authentication controls and increase the risk of unauthorized access. Belgium's Center for Cybersecurity (CCB) later issued a public warning describing the GoHarbor Harbor issue as **critical** and urging organizations to patch immediately. The alert signals elevated concern for enterprises that rely on Harbor to store and manage container images, as unremediated systems could be at risk if attackers are able to leverage the hard-coded credentials vulnerability.

1 months ago
Multiple High-Impact Vulnerabilities Disclosed Across Diverse Software Platforms

Multiple High-Impact Vulnerabilities Disclosed Across Diverse Software Platforms

A series of critical and high-severity vulnerabilities have been disclosed affecting a wide range of software products, including workflow automation tools, web applications, network devices, and desktop software. Notable issues include remote code execution (RCE) flaws in *n8n*, *Lilac-Reloaded for Nagios*, *FileZilla Client*, and *AVideo*, as well as privilege escalation vulnerabilities in products like *Versa SASE Client*, *AspEmail*, and *ActFax*. Several vulnerabilities allow unauthenticated attackers to upload arbitrary files, bypass authentication, or exploit weak session management, potentially leading to full system compromise or unauthorized access to sensitive data. Many of these vulnerabilities have public exploits available, increasing the risk of active exploitation in the wild. Vendors have released patches for several of the affected products, and administrators are strongly advised to update to the latest versions or apply recommended mitigations. The vulnerabilities span a variety of attack vectors, including buffer overflows, improper input validation, insecure file upload mechanisms, and misconfigured authentication endpoints. Organizations should prioritize patching systems exposed to the internet and review access controls to limit the impact of potential exploitation. Immediate attention is warranted for products with critical CVSS scores and those with known public exploits.

1 months ago
TWCERT/CC Discloses Critical Injection Flaws in NewSoftOA and Sunnet CTMS

TWCERT/CC Discloses Critical Injection Flaws in NewSoftOA and Sunnet CTMS

TWCERT/CC published advisories for two high-severity enterprise software vulnerabilities that could let attackers compromise backend systems and data. **CVE-2026-5965** affects **NewSoftOA** from NewSoft and is an **OS command injection** flaw (`CWE-78`) that allows **unauthenticated remote attackers** to execute arbitrary operating system commands on the server. The issue carries a `CVSS v3.1` score with vector `AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`, indicating low-complexity network exploitation with high impact across confidentiality, integrity, and availability. A second advisory, **CVE-2026-7489**, affects **Sunnet CTMS** and describes a **SQL injection** vulnerability (`CWE-89`) that allows **authenticated remote attackers** to run arbitrary SQL commands against the application database. Successful exploitation could enable reading, modifying, and deleting database contents, with a `CVSS v3.1` vector of `AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`. Both vulnerabilities were published with English and Chinese references by TWCERT/CC, underscoring continued exposure in internet-reachable business applications to injection attacks that can lead to full server compromise or severe database manipulation.

4 days ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.