CVE-2025-27616 – github.com/go-vela/server
Package
Manager: go
Name: github.com/go-vela/server
Vulnerable Version: >=0 <0.25.3 || >=0.26.0 <0.26.3
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
EPSS: 0.00055 pctl0.17258
Details
Vela Server Has Insufficient Webhook Payload Data Verification ### Impact Users with an enabled repository with access to repo level CI secrets in Vela are vulnerable to the exploit. Any user with access to the CI instance and the linked source control manager can perform the exploit. ### Method By spoofing a webhook payload with a specific set of headers and body data, an attacker could transfer ownership of a repository and its repo level secrets to a separate repository. These secrets could be exfiltrated by follow up builds to the repository. ### Patches `v0.26.3` — Image: `target/vela-server:v0.26.3` `v0.25.3` — Image: `target/vela-server:v0.25.3` ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ There are no workarounds to the issue. ### References _Are there any links users can visit to find out more?_ Please see linked CWEs (common weakness enumerators) for more information.
Metadata
Created: 2025-03-10T22:24:35Z
Modified: 2025-03-14T20:02:47Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/03/GHSA-9m63-33q3-xq5x/GHSA-9m63-33q3-xq5x.json
CWE IDs: ["CWE-290", "CWE-345"]
Alternative ID: GHSA-9m63-33q3-xq5x
Finding: F204
Auto approve: 1