Home / Vulnerabilities / CVE-2023-7028
CRITICAL SEVERITY
CVE-2023-7028 GitLab · GitLab CE/EE

GitLab Community and Enterprise Editions Improper Access Control Vulnerability

Technical Severity

CVSS v3.1 Metrics

CRITICAL
10 / 10
Minimal Risk Critical
Vector Specification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
Exploitation Likelihood

EPSS Prediction

93.60 %
Predictive Probability
Percentile Rank
99.8 th

Documented as more likely to be exploited than 99.8% of known CVEs.

Detection Date

May 01, 2024

Remediation Due

May 22, 2024

CISA Catalog Active

Threat Analysis

GitLab Community and Enterprise Editions contain an improper access control vulnerability. This allows an attacker to trigger password reset emails to be sent to an unverified email address to ultimately facilitate an account takeover.

Remediation Directive

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

External Intelligence