Skip to main content

CVE-2022-3066: Authorization bypass through user-controlled key in GitLab in GitLab GitLab

Medium
VulnerabilityCVE-2022-3066cvecve-2022-3066
Published: Mon Oct 17 2022 (10/17/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: GitLab
Product: GitLab

Description

An issue has been discovered in GitLab affecting all versions starting from 10.0 before 15.2.5, all versions starting from 15.3 before 15.3.4, all versions starting from 15.4 before 15.4.1. It was possible for an unauthorised user to create issues in a project.

AI-Powered Analysis

AILast updated: 07/04/2025, 19:42:43 UTC

Technical Analysis

CVE-2022-3066 is a medium-severity authorization bypass vulnerability affecting GitLab versions from 10.0 up to but not including 15.2.5, versions 15.3 up to but not including 15.3.4, and versions 15.4 up to but not including 15.4.1. The vulnerability allows an unauthorized user to create issues within a project, which normally requires appropriate permissions. The root cause is an authorization bypass through a user-controlled key, classified under CWE-284 (Improper Access Control). This means that the access control mechanism in GitLab failed to properly validate the user's permissions before allowing issue creation. The CVSS 3.1 base score is 5.4, indicating a medium severity with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N, meaning the attack can be performed remotely over the network with low attack complexity, requires low privileges, no user interaction, and impacts confidentiality and integrity to a limited extent but does not affect availability. No known exploits are reported in the wild as of the publication date. The vulnerability was publicly disclosed on October 17, 2022. Since GitLab is widely used for source code management, CI/CD pipelines, and project management, this flaw could allow unauthorized actors to inject issues, potentially leading to misinformation, disruption of project workflows, or social engineering attacks within affected projects.

Potential Impact

For European organizations, the impact of CVE-2022-3066 can be significant depending on their reliance on GitLab for software development and project management. Unauthorized issue creation could be leveraged to introduce misleading or malicious tasks, confuse development teams, or facilitate further attacks by planting backdoors or vulnerabilities through social engineering. Confidentiality and integrity of project data could be compromised, potentially exposing sensitive project details or intellectual property. While availability is not directly impacted, the integrity breach could delay development cycles and reduce trust in the project management process. Organizations in sectors with strict compliance requirements (e.g., finance, healthcare, critical infrastructure) may face regulatory risks if unauthorized access leads to data leaks or manipulation. The requirement for low privileges to exploit the vulnerability means that even users with minimal access or compromised accounts could abuse this flaw, increasing the attack surface.

Mitigation Recommendations

European organizations should immediately verify their GitLab versions and upgrade to the patched versions: 15.2.5 or later for versions before 15.3, 15.3.4 or later for 15.3 series, and 15.4.1 or later for 15.4 series. In addition to patching, organizations should audit user permissions and restrict issue creation rights to trusted users only. Implementing strict monitoring and alerting on unusual issue creation activities can help detect exploitation attempts early. Employ network segmentation and access controls to limit exposure of GitLab instances to only necessary personnel and IP ranges. Regularly review and harden GitLab configuration settings, including API access and authentication mechanisms. Finally, conduct security awareness training to inform developers and project managers about the risks of unauthorized issue manipulation and encourage reporting suspicious activities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitLab
Date Reserved
2022-08-30T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9815c4522896dcbd6002

Added to database: 5/21/2025, 9:08:37 AM

Last enriched: 7/4/2025, 7:42:43 PM

Last updated: 7/31/2025, 12:03:03 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats