CVE-2022-31128: CWE-862: Missing Authorization in Enalean tuleap
Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In affected versions Tuleap does not properly verify permissions when creating branches with the REST API in Git repositories using the fine grained permissions. Users can create branches via the REST endpoint `POST git/:id/branches` regardless of the permissions set on the repository. This issue has been fixed in version 13.10.99.82 Tuleap Community Edition as well as in version 13.10-3 of Tuleap Enterprise Edition. Users are advised to upgrade. There are no known workarounds for this issue.
AI Analysis
Technical Summary
CVE-2022-31128 is a security vulnerability identified in Enalean's Tuleap software, an open-source suite designed to facilitate software development management and collaboration. The vulnerability stems from a missing authorization check (CWE-862) in the REST API endpoint responsible for creating Git branches (`POST git/:id/branches`). Specifically, in affected versions of Tuleap (versions >= 13.9.99.110 and < 13.10.99.82), the system fails to properly verify whether a user has the necessary permissions to create branches within Git repositories that use fine-grained permission controls. This flaw allows any authenticated user, regardless of their assigned repository permissions, to create branches via the REST API. The ability to create branches without proper authorization can undermine repository integrity and potentially facilitate unauthorized code changes or the introduction of malicious code. The issue was resolved in Tuleap Community Edition version 13.10.99.82 and Tuleap Enterprise Edition version 13.10-3. No known workarounds exist, so upgrading to a fixed version is the primary remediation. There are no reports of active exploitation in the wild as of the publication date. The vulnerability does not require user interaction beyond authentication, but it does require the attacker to have some level of access to the Tuleap instance (authenticated user).
Potential Impact
For European organizations utilizing Tuleap for software development and collaboration, this vulnerability poses a risk to the integrity and trustworthiness of their source code repositories. Unauthorized branch creation can lead to unauthorized code changes, potentially introducing vulnerabilities, backdoors, or other malicious modifications into the development lifecycle. This can compromise the integrity of software products, disrupt development workflows, and increase the risk of supply chain attacks. Organizations in sectors with high regulatory and compliance requirements (e.g., finance, healthcare, critical infrastructure) may face increased risk due to potential violations of software integrity and audit requirements. Additionally, the vulnerability could be leveraged by insider threats or compromised accounts to escalate privileges within the development environment. Although the vulnerability does not directly affect confidentiality or availability, the integrity impact is significant, especially in environments where code integrity is critical. The lack of known exploits reduces immediate risk, but the presence of the vulnerability in widely used versions means organizations should act promptly to mitigate potential future exploitation.
Mitigation Recommendations
1. Immediate Upgrade: Organizations should upgrade affected Tuleap instances to version 13.10.99.82 (Community Edition) or 13.10-3 (Enterprise Edition) or later to apply the official patch that enforces proper authorization checks. 2. Access Control Review: Conduct a thorough review of user permissions and roles within Tuleap to ensure that only trusted users have access to repository management features. 3. API Usage Monitoring: Implement monitoring and logging of REST API calls, especially branch creation events, to detect any unauthorized or anomalous activity. 4. Network Segmentation: Restrict access to the Tuleap instance’s API endpoints to trusted networks and users, reducing the attack surface. 5. Multi-Factor Authentication (MFA): Enforce MFA for all users accessing Tuleap to reduce the risk of compromised credentials being used to exploit this vulnerability. 6. Incident Response Preparedness: Develop and test incident response plans specific to source code repository integrity breaches, including rollback procedures and forensic analysis. 7. Security Awareness: Educate developers and administrators about the risks of unauthorized branch creation and encourage vigilance in code review processes to detect suspicious changes.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy
CVE-2022-31128: CWE-862: Missing Authorization in Enalean tuleap
Description
Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In affected versions Tuleap does not properly verify permissions when creating branches with the REST API in Git repositories using the fine grained permissions. Users can create branches via the REST endpoint `POST git/:id/branches` regardless of the permissions set on the repository. This issue has been fixed in version 13.10.99.82 Tuleap Community Edition as well as in version 13.10-3 of Tuleap Enterprise Edition. Users are advised to upgrade. There are no known workarounds for this issue.
AI-Powered Analysis
Technical Analysis
CVE-2022-31128 is a security vulnerability identified in Enalean's Tuleap software, an open-source suite designed to facilitate software development management and collaboration. The vulnerability stems from a missing authorization check (CWE-862) in the REST API endpoint responsible for creating Git branches (`POST git/:id/branches`). Specifically, in affected versions of Tuleap (versions >= 13.9.99.110 and < 13.10.99.82), the system fails to properly verify whether a user has the necessary permissions to create branches within Git repositories that use fine-grained permission controls. This flaw allows any authenticated user, regardless of their assigned repository permissions, to create branches via the REST API. The ability to create branches without proper authorization can undermine repository integrity and potentially facilitate unauthorized code changes or the introduction of malicious code. The issue was resolved in Tuleap Community Edition version 13.10.99.82 and Tuleap Enterprise Edition version 13.10-3. No known workarounds exist, so upgrading to a fixed version is the primary remediation. There are no reports of active exploitation in the wild as of the publication date. The vulnerability does not require user interaction beyond authentication, but it does require the attacker to have some level of access to the Tuleap instance (authenticated user).
Potential Impact
For European organizations utilizing Tuleap for software development and collaboration, this vulnerability poses a risk to the integrity and trustworthiness of their source code repositories. Unauthorized branch creation can lead to unauthorized code changes, potentially introducing vulnerabilities, backdoors, or other malicious modifications into the development lifecycle. This can compromise the integrity of software products, disrupt development workflows, and increase the risk of supply chain attacks. Organizations in sectors with high regulatory and compliance requirements (e.g., finance, healthcare, critical infrastructure) may face increased risk due to potential violations of software integrity and audit requirements. Additionally, the vulnerability could be leveraged by insider threats or compromised accounts to escalate privileges within the development environment. Although the vulnerability does not directly affect confidentiality or availability, the integrity impact is significant, especially in environments where code integrity is critical. The lack of known exploits reduces immediate risk, but the presence of the vulnerability in widely used versions means organizations should act promptly to mitigate potential future exploitation.
Mitigation Recommendations
1. Immediate Upgrade: Organizations should upgrade affected Tuleap instances to version 13.10.99.82 (Community Edition) or 13.10-3 (Enterprise Edition) or later to apply the official patch that enforces proper authorization checks. 2. Access Control Review: Conduct a thorough review of user permissions and roles within Tuleap to ensure that only trusted users have access to repository management features. 3. API Usage Monitoring: Implement monitoring and logging of REST API calls, especially branch creation events, to detect any unauthorized or anomalous activity. 4. Network Segmentation: Restrict access to the Tuleap instance’s API endpoints to trusted networks and users, reducing the attack surface. 5. Multi-Factor Authentication (MFA): Enforce MFA for all users accessing Tuleap to reduce the risk of compromised credentials being used to exploit this vulnerability. 6. Incident Response Preparedness: Develop and test incident response plans specific to source code repository integrity breaches, including rollback procedures and forensic analysis. 7. Security Awareness: Educate developers and administrators about the risks of unauthorized branch creation and encourage vigilance in code review processes to detect suspicious changes.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-05-18T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9844c4522896dcbf387a
Added to database: 5/21/2025, 9:09:24 AM
Last enriched: 6/23/2025, 1:36:00 AM
Last updated: 2/7/2026, 2:06:29 PM
Views: 32
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2086: Buffer Overflow in UTT HiPER 810G
HighOrganizations Urged to Replace Discontinued Edge Devices
MediumCVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.