CVE-2023-3920: CWE-863: Incorrect Authorization in GitLab GitLab
An issue has been discovered in GitLab affecting all versions starting from 11.2 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. It was possible that a maintainer to create a fork relationship between existing projects contrary to the documentation.
AI Analysis
Technical Summary
CVE-2023-3920 is a medium-severity vulnerability affecting GitLab versions starting from 11.2 up to versions before 16.2.8, 16.3 up to before 16.3.5, and 16.4 up to before 16.4.1. The vulnerability is classified under CWE-863, which relates to incorrect authorization. Specifically, this flaw allows a user with maintainer privileges to create a fork relationship between existing projects in a manner that contradicts GitLab's documented behavior. Normally, fork relationships are expected to follow strict authorization rules to prevent unauthorized project linkage, which could lead to unintended information exposure or project management confusion. The vulnerability does not affect confidentiality directly but impacts integrity by allowing unauthorized project relationships to be established. The CVSS 3.1 base score is 4.3 (medium), reflecting that the vulnerability requires low complexity (AC:L), network attack vector (AV:N), privileges required are low (PR:L), no user interaction (UI:N), and the impact is limited to integrity (I:L) without affecting confidentiality or availability. No known exploits are reported in the wild as of the published date. The issue affects a broad range of GitLab versions, indicating a long-standing flaw that has been addressed in recent patches beyond the affected versions. This vulnerability could be exploited remotely by authenticated maintainers without user interaction, potentially allowing them to manipulate project relationships in ways not intended by the platform's design. This could lead to confusion in project management, unauthorized codebase linkage, or indirect exposure of project metadata.
Potential Impact
For European organizations relying on GitLab for source code management and DevOps workflows, this vulnerability could undermine the integrity of project structures and workflows. Unauthorized fork relationships might lead to confusion in project ownership, misattribution of code changes, or inadvertent exposure of project metadata to unauthorized teams or collaborators. While the vulnerability does not directly expose sensitive data or disrupt availability, the integrity compromise could facilitate further social engineering or insider threats by obscuring project boundaries. Organizations with strict compliance requirements around code provenance and audit trails may find this particularly problematic. Additionally, organizations using GitLab for critical infrastructure or regulated environments could face increased risk if attackers leverage this flaw to manipulate project relationships to bypass controls or introduce unauthorized code changes indirectly.
Mitigation Recommendations
European organizations should promptly update GitLab instances to versions 16.2.8 or later, 16.3.5 or later, or 16.4.1 or later, depending on their current version. Since no official patch links are provided in the data, organizations should monitor GitLab's official security advisories and repositories for the relevant patches. In the interim, organizations should audit existing project fork relationships for anomalies and restrict maintainer privileges to trusted personnel only. Implementing strict access controls and monitoring for unusual project relationship changes can help detect exploitation attempts. Additionally, enabling detailed logging and alerting on project fork creation events will aid in early detection. Organizations should also review their internal policies on project forking and educate maintainers about the potential risks associated with unauthorized fork relationships. Finally, consider isolating critical projects in separate GitLab groups or instances to limit the blast radius of any unauthorized changes.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2023-3920: CWE-863: Incorrect Authorization in GitLab GitLab
Description
An issue has been discovered in GitLab affecting all versions starting from 11.2 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. It was possible that a maintainer to create a fork relationship between existing projects contrary to the documentation.
AI-Powered Analysis
Technical Analysis
CVE-2023-3920 is a medium-severity vulnerability affecting GitLab versions starting from 11.2 up to versions before 16.2.8, 16.3 up to before 16.3.5, and 16.4 up to before 16.4.1. The vulnerability is classified under CWE-863, which relates to incorrect authorization. Specifically, this flaw allows a user with maintainer privileges to create a fork relationship between existing projects in a manner that contradicts GitLab's documented behavior. Normally, fork relationships are expected to follow strict authorization rules to prevent unauthorized project linkage, which could lead to unintended information exposure or project management confusion. The vulnerability does not affect confidentiality directly but impacts integrity by allowing unauthorized project relationships to be established. The CVSS 3.1 base score is 4.3 (medium), reflecting that the vulnerability requires low complexity (AC:L), network attack vector (AV:N), privileges required are low (PR:L), no user interaction (UI:N), and the impact is limited to integrity (I:L) without affecting confidentiality or availability. No known exploits are reported in the wild as of the published date. The issue affects a broad range of GitLab versions, indicating a long-standing flaw that has been addressed in recent patches beyond the affected versions. This vulnerability could be exploited remotely by authenticated maintainers without user interaction, potentially allowing them to manipulate project relationships in ways not intended by the platform's design. This could lead to confusion in project management, unauthorized codebase linkage, or indirect exposure of project metadata.
Potential Impact
For European organizations relying on GitLab for source code management and DevOps workflows, this vulnerability could undermine the integrity of project structures and workflows. Unauthorized fork relationships might lead to confusion in project ownership, misattribution of code changes, or inadvertent exposure of project metadata to unauthorized teams or collaborators. While the vulnerability does not directly expose sensitive data or disrupt availability, the integrity compromise could facilitate further social engineering or insider threats by obscuring project boundaries. Organizations with strict compliance requirements around code provenance and audit trails may find this particularly problematic. Additionally, organizations using GitLab for critical infrastructure or regulated environments could face increased risk if attackers leverage this flaw to manipulate project relationships to bypass controls or introduce unauthorized code changes indirectly.
Mitigation Recommendations
European organizations should promptly update GitLab instances to versions 16.2.8 or later, 16.3.5 or later, or 16.4.1 or later, depending on their current version. Since no official patch links are provided in the data, organizations should monitor GitLab's official security advisories and repositories for the relevant patches. In the interim, organizations should audit existing project fork relationships for anomalies and restrict maintainer privileges to trusted personnel only. Implementing strict access controls and monitoring for unusual project relationship changes can help detect exploitation attempts. Additionally, enabling detailed logging and alerting on project fork creation events will aid in early detection. Organizations should also review their internal policies on project forking and educate maintainers about the potential risks associated with unauthorized fork relationships. Finally, consider isolating critical projects in separate GitLab groups or instances to limit the blast radius of any unauthorized changes.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitLab
- Date Reserved
- 2023-07-25T10:30:33.135Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682ea68a0acd01a249253f6a
Added to database: 5/22/2025, 4:22:34 AM
Last enriched: 7/7/2025, 11:40:07 AM
Last updated: 7/26/2025, 6:36:10 AM
Views: 14
Related Threats
CVE-2025-8834: Cross Site Scripting in JCG Link-net LW-N915R
MediumCVE-2025-55159: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in tokio-rs slab
MediumCVE-2025-55161: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-25235: CWE-918 Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway
HighCVE-2025-55151: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.