Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-2931: Uncontrolled resource consumption in GitLab in GitLab GitLab

0
High
VulnerabilityCVE-2022-2931cvecve-2022-2931
Published: Mon Oct 17 2022 (10/17/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: GitLab
Product: GitLab

Description

A potential DOS vulnerability was discovered in GitLab CE/EE affecting all versions before 15.1.6, all versions starting from 15.2 before 15.2.4, all versions starting from 15.3 before 15.3.2. Malformed content added to the issue description could have been used to trigger high CPU usage.

AI-Powered Analysis

AILast updated: 07/04/2025, 19:41:48 UTC

Technical Analysis

CVE-2022-2931 is a high-severity denial-of-service (DoS) vulnerability affecting GitLab Community Edition (CE) and Enterprise Edition (EE) versions prior to 15.1.6, versions from 15.2 up to but not including 15.2.4, and versions from 15.3 up to but not including 15.3.2. The vulnerability arises from uncontrolled resource consumption triggered by malformed content added to the issue description field within GitLab. Specifically, an attacker can craft specially malformed input that, when processed by GitLab's issue tracking system, causes excessive CPU usage. This can degrade the performance of the GitLab instance, potentially leading to service unavailability or significant slowdowns. The vulnerability does not require authentication or user interaction, making it remotely exploitable over the network by unauthenticated attackers. The CVSS v3.1 base score is 7.5, reflecting a high severity due to the ease of exploitation (network vector, no privileges required, no user interaction) and the impact on availability (high impact on availability, no impact on confidentiality or integrity). There are no known exploits in the wild reported to date, but the vulnerability's nature makes it a candidate for potential exploitation in the future if unpatched. The issue is specifically related to how GitLab parses and processes issue descriptions, indicating a flaw in input validation or resource management within this component. No direct patch links were provided in the source, but GitLab has released fixed versions (15.1.6, 15.2.4, 15.3.2 and later) to address this issue. Organizations running vulnerable GitLab versions should prioritize upgrading to these patched releases to mitigate the risk.

Potential Impact

For European organizations, the impact of CVE-2022-2931 can be significant, especially for those relying heavily on GitLab for source code management, issue tracking, and CI/CD pipelines. A successful exploitation could lead to denial of service, disrupting development workflows, delaying software releases, and potentially impacting business operations dependent on continuous integration and deployment. This could be particularly damaging for sectors with stringent operational continuity requirements such as finance, healthcare, telecommunications, and critical infrastructure. Additionally, organizations using self-hosted GitLab instances exposed to the internet are at higher risk, as the vulnerability can be triggered remotely without authentication. The disruption caused by high CPU usage could also lead to increased operational costs due to resource exhaustion and potential downtime. While the vulnerability does not directly compromise data confidentiality or integrity, the availability impact alone can cause cascading effects on productivity and service delivery. Furthermore, given the widespread adoption of GitLab across European enterprises and public sector organizations, the scale of potential impact is considerable if patches are not applied promptly.

Mitigation Recommendations

To mitigate CVE-2022-2931, European organizations should take the following specific actions beyond generic patching advice: 1) Immediately upgrade all GitLab CE/EE instances to versions 15.1.6, 15.2.4, 15.3.2, or later where the vulnerability is fixed. 2) If immediate upgrading is not feasible, implement network-level protections such as web application firewalls (WAFs) with rules to detect and block malformed issue description payloads or abnormal request patterns targeting issue creation endpoints. 3) Restrict access to GitLab instances by limiting exposure to the internet; enforce VPN or zero-trust network access models to reduce attack surface. 4) Monitor GitLab server resource usage closely for unusual CPU spikes, especially correlated with issue creation or updates, to detect potential exploitation attempts early. 5) Review and tighten permissions on who can create or edit issues, potentially limiting this capability to trusted users temporarily until patches are applied. 6) Maintain up-to-date backups and incident response plans to quickly recover from any service disruption. 7) Engage with GitLab security advisories and community channels to stay informed about any emerging exploit techniques or additional mitigations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
GitLab
Date Reserved
2022-08-22T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9815c4522896dcbd5fdf

Added to database: 5/21/2025, 9:08:37 AM

Last enriched: 7/4/2025, 7:41:48 PM

Last updated: 2/7/2026, 3:19:52 PM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats