An attacker can post malformed webhook data which leads to an update of the repository data that can e.g. allow the takeover of a repository. This is only critical if the CI is configured for public usage and connected to a forge witch is also in public usage.
Please use either next or the latest v1.0 e.g. v1.0.2
Secure the CI system by making it inaccessible to untrusted entities, for example, by placing it behind a firewall.
Fix: https://github.com/woodpecker-ci/woodpecker/pull/2221 Backport: https://github.com/woodpecker-ci/woodpecker/pull/2222
{ "github_reviewed_at": "2023-08-16T21:02:29Z", "cwe_ids": [ "CWE-20" ], "nvd_published_at": "2023-08-16T21:15:10Z", "severity": "HIGH", "github_reviewed": true }