Miggo Logo

CVE-2025-27616:
Vela Server Has Insufficient Webhook Payload Data Verification

8.6

CVSS Score
3.1

Basic Information

EPSS Score
0.11711%
Published
3/10/2025
Updated
3/14/2025
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/go-vela/servergo< 0.25.30.25.3
github.com/go-vela/servergo>= 0.26.0, <= 0.26.20.26.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from insufficient validation in webhook processing. Key issues include:

  1. The PostWebhook function initially lacked proper webhook signature verification using stored repo secrets (added in patch 67c1892)
  2. Repository event handling trusted payload data over database state, enabling spoofed ownership transfers
  3. CORS misconfigurations (patched in 257886e) could facilitate cross-origin attacks, though the primary vulnerability was in webhook auth
  4. The processRepositoryEvent function didn't validate payload completeness, risking nil pointer exploitation Patch commits show critical security checks were added to webhook validation flows and repository data handling.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t Us*rs wit* *n *n**l** r*pository wit* ****ss to r*po l*v*l *I s**r*ts in V*l* *r* vuln*r**l* to t** *xploit. *ny us*r wit* ****ss to t** *I inst*n** *n* t** link** sour** *ontrol m*n***r **n p*r*orm t** *xploit. ### M*t*o* *y spoo*in* *

Reasoning

T** vuln*r**ility st*ms *rom insu**i*i*nt v*li**tion in w***ook pro**ssin*. K*y issu*s in*lu**: *. T** PostW***ook *un*tion initi*lly l**k** prop*r w***ook si*n*tur* v*ri*i**tion usin* stor** r*po s**r*ts (***** in p*t** *******) *. R*pository *v*nt