CVE-2025-58158

Harness Affected by Arbitrary File Write in Gitness LFS server

Description

Harness Open Source is an end-to-end developer platform with Source Control Management, CI/CD Pipelines, Hosted Developer Environments, and Artifact Registries. Prior to version 3.3.0, Open Source Harness git LFS server (Gitness) exposes api to retrieve and upload files via git LFS. Implementation of upload git LFS file api is vulnerable to arbitrary file write. Due to improper sanitization for upload path, a malicious authenticated user who has access to Harness Gitness server api can use a crafted upload request to write arbitrary file to any location on file system, may even compromise the server. Users using git LFS are vulnerable. This issue has been patched in version 3.3.0.

Category

8.8
CVSS
Severity: High
CVSS 3.1 •
Affected: harness harness
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2025-58158?
CVE-2025-58158 has been scored as a high severity vulnerability.
How to fix CVE-2025-58158?
To fix CVE-2025-58158, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2025-58158 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2025-58158 is being actively exploited.
What software or system is affected by CVE-2025-58158?
CVE-2025-58158 affects harness harness.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.