CVE-2025-58158

Harness · Harness Open Source

**A high-severity vulnerability of an unspecified type has been discovered in Harness Open Source, a developer platform, which could lead to the compromise of source code, CI/CD pipelines, or other cr.

Executive summary

A high-severity vulnerability of an unspecified type has been discovered in Harness Open Source, a developer platform, which could lead to the compromise of source code, CI/CD pipelines, or other critical development assets.

Vulnerability

The public description does not contain specific details about the nature of the vulnerability. Given the platform's function, the flaw could relate to access control, command injection in pipeline execution, or insecure handling of secrets.

Business impact

With a CVSS score of 8.8 (High), this vulnerability represents a severe threat to an organization's software development lifecycle. A successful exploit could allow an attacker to steal proprietary source code, inject malicious code into the CI/CD pipeline, deploy unauthorized applications, or access sensitive credentials and API keys stored within the platform. This could lead to a widespread supply chain attack or significant intellectual property theft.

Remediation

Immediate Action: Consult the Harness security advisory and apply the recommended patches or updates to all instances of Harness Open Source immediately.

Proactive Monitoring: Closely audit Harness platform logs for any unauthorized access, unusual pipeline executions, or modifications to project configurations. Monitor for suspicious commits or code changes in integrated source control systems.

Compensating Controls: Enforce multi-factor authentication and the principle of least privilege for all users of the Harness platform. Regularly rotate all secrets and credentials managed by the platform.

Exploitation status

Public Exploit Available: false

Analyst recommendation

This is a critical vulnerability that strikes at the heart of the software development process. The potential for source code theft and pipeline compromise demands an immediate and urgent response. All organizations using Harness Open Source must prioritize applying the vendor's patch.