CVE-2022-3066: Authorization bypass through user-controlled key in GitLab in GitLab GitLab
An issue has been discovered in GitLab affecting all versions starting from 10.0 before 15.2.5, all versions starting from 15.3 before 15.3.4, all versions starting from 15.4 before 15.4.1. It was possible for an unauthorised user to create issues in a project.
AI Analysis
Technical Summary
CVE-2022-3066 is a medium-severity authorization bypass vulnerability affecting GitLab versions from 10.0 up to but not including 15.2.5, versions 15.3 up to but not including 15.3.4, and versions 15.4 up to but not including 15.4.1. The vulnerability allows an unauthorized user to create issues within a project, which normally requires appropriate permissions. The root cause is an authorization bypass through a user-controlled key, classified under CWE-284 (Improper Access Control). This means that the access control mechanism in GitLab failed to properly validate the user's permissions before allowing issue creation. The CVSS 3.1 base score is 5.4, indicating a medium severity with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N, meaning the attack can be performed remotely over the network with low attack complexity, requires low privileges, no user interaction, and impacts confidentiality and integrity to a limited extent but does not affect availability. No known exploits are reported in the wild as of the publication date. The vulnerability was publicly disclosed on October 17, 2022. Since GitLab is widely used for source code management, CI/CD pipelines, and project management, this flaw could allow unauthorized actors to inject issues, potentially leading to misinformation, disruption of project workflows, or social engineering attacks within affected projects.
Potential Impact
For European organizations, the impact of CVE-2022-3066 can be significant depending on their reliance on GitLab for software development and project management. Unauthorized issue creation could be leveraged to introduce misleading or malicious tasks, confuse development teams, or facilitate further attacks by planting backdoors or vulnerabilities through social engineering. Confidentiality and integrity of project data could be compromised, potentially exposing sensitive project details or intellectual property. While availability is not directly impacted, the integrity breach could delay development cycles and reduce trust in the project management process. Organizations in sectors with strict compliance requirements (e.g., finance, healthcare, critical infrastructure) may face regulatory risks if unauthorized access leads to data leaks or manipulation. The requirement for low privileges to exploit the vulnerability means that even users with minimal access or compromised accounts could abuse this flaw, increasing the attack surface.
Mitigation Recommendations
European organizations should immediately verify their GitLab versions and upgrade to the patched versions: 15.2.5 or later for versions before 15.3, 15.3.4 or later for 15.3 series, and 15.4.1 or later for 15.4 series. In addition to patching, organizations should audit user permissions and restrict issue creation rights to trusted users only. Implementing strict monitoring and alerting on unusual issue creation activities can help detect exploitation attempts early. Employ network segmentation and access controls to limit exposure of GitLab instances to only necessary personnel and IP ranges. Regularly review and harden GitLab configuration settings, including API access and authentication mechanisms. Finally, conduct security awareness training to inform developers and project managers about the risks of unauthorized issue manipulation and encourage reporting suspicious activities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy
CVE-2022-3066: Authorization bypass through user-controlled key in GitLab in GitLab GitLab
Description
An issue has been discovered in GitLab affecting all versions starting from 10.0 before 15.2.5, all versions starting from 15.3 before 15.3.4, all versions starting from 15.4 before 15.4.1. It was possible for an unauthorised user to create issues in a project.
AI-Powered Analysis
Technical Analysis
CVE-2022-3066 is a medium-severity authorization bypass vulnerability affecting GitLab versions from 10.0 up to but not including 15.2.5, versions 15.3 up to but not including 15.3.4, and versions 15.4 up to but not including 15.4.1. The vulnerability allows an unauthorized user to create issues within a project, which normally requires appropriate permissions. The root cause is an authorization bypass through a user-controlled key, classified under CWE-284 (Improper Access Control). This means that the access control mechanism in GitLab failed to properly validate the user's permissions before allowing issue creation. The CVSS 3.1 base score is 5.4, indicating a medium severity with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N, meaning the attack can be performed remotely over the network with low attack complexity, requires low privileges, no user interaction, and impacts confidentiality and integrity to a limited extent but does not affect availability. No known exploits are reported in the wild as of the publication date. The vulnerability was publicly disclosed on October 17, 2022. Since GitLab is widely used for source code management, CI/CD pipelines, and project management, this flaw could allow unauthorized actors to inject issues, potentially leading to misinformation, disruption of project workflows, or social engineering attacks within affected projects.
Potential Impact
For European organizations, the impact of CVE-2022-3066 can be significant depending on their reliance on GitLab for software development and project management. Unauthorized issue creation could be leveraged to introduce misleading or malicious tasks, confuse development teams, or facilitate further attacks by planting backdoors or vulnerabilities through social engineering. Confidentiality and integrity of project data could be compromised, potentially exposing sensitive project details or intellectual property. While availability is not directly impacted, the integrity breach could delay development cycles and reduce trust in the project management process. Organizations in sectors with strict compliance requirements (e.g., finance, healthcare, critical infrastructure) may face regulatory risks if unauthorized access leads to data leaks or manipulation. The requirement for low privileges to exploit the vulnerability means that even users with minimal access or compromised accounts could abuse this flaw, increasing the attack surface.
Mitigation Recommendations
European organizations should immediately verify their GitLab versions and upgrade to the patched versions: 15.2.5 or later for versions before 15.3, 15.3.4 or later for 15.3 series, and 15.4.1 or later for 15.4 series. In addition to patching, organizations should audit user permissions and restrict issue creation rights to trusted users only. Implementing strict monitoring and alerting on unusual issue creation activities can help detect exploitation attempts early. Employ network segmentation and access controls to limit exposure of GitLab instances to only necessary personnel and IP ranges. Regularly review and harden GitLab configuration settings, including API access and authentication mechanisms. Finally, conduct security awareness training to inform developers and project managers about the risks of unauthorized issue manipulation and encourage reporting suspicious activities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitLab
- Date Reserved
- 2022-08-30T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9815c4522896dcbd6002
Added to database: 5/21/2025, 9:08:37 AM
Last enriched: 7/4/2025, 7:42:43 PM
Last updated: 7/31/2025, 12:03:03 PM
Views: 13
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.