LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →

CVE-2026-4404 - Vulnerability Analysis

CriticalCVSS: 9.4

Last Updated: March 23, 2026

GoHarbor Harbor - Authentication Bypass

Published: March 23, 2026Updated: March 23, 2026Remote Exploitable

Overview

GoHarbor Harbor <= 2.15.0 contains hardcoded credentials allowing attackers to use default passwords to access the web UI, exploit requires no special conditions.

Severity & Score

Severity: Critical
CVSS Score: 9.4
EPSS Score: 0.0%(Probability of exploitation in next 30 days)

Impact

Attackers can access the web UI using default credentials, leading to unauthorized access.

Mitigation

Update to the latest version beyond 2.15.0.

Social Media Activity(2 posts)

TheHackerWire
TheHackerWire
@thehackerwire
Mar 23, 2026

šŸ”“ CVE-2026-4404 - Critical (9.4) Use of hard coded credentials in GoHarbor Harbor version 2.15.0 and below, allows attackers to use the default password and gain access to the web UI. šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-4404/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post
TheHackerWire
TheHackerWire
@thehackerwire
Mar 23, 2026

šŸ”“ CVE-2026-4404 - Critical (9.4) Use of hard coded credentials in GoHarbor Harbor version 2.15.0 and below, allows attackers to use the default password and gain access to the web UI. šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-4404/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-4404
Severity
Critical
CVSS Score
9.4
Type
hardcoded_credentials
Status
new
EPSS
0.0%
Social Posts
2

CWE

  • CWE-798

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L

EPSS Score

0.0%Probability of exploitation in the next 30 days