CVE-2023-4018: CWE-425: Direct Request ('Forced Browsing') in GitLab GitLab
An issue has been discovered in GitLab affecting all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1. Due to improper permission validation it was possible to create model experiments in public projects.
AI Analysis
Technical Summary
CVE-2023-4018 is a medium-severity vulnerability affecting GitLab versions 16.2 up to but not including 16.2.5, and 16.3 up to but not including 16.3.1. The vulnerability is categorized under CWE-425, which relates to improper permission validation leading to direct request or forced browsing attacks. Specifically, this flaw allows an authenticated user with limited privileges (requiring low privileges but no user interaction) to create model experiments within public projects where such actions should be restricted. The root cause is improper permission checks in GitLab’s handling of model experiment creation, enabling unauthorized actions by bypassing intended access controls. The CVSS 3.1 score is 4.3 (medium), reflecting that the attack vector is network-based, requires low privileges, no user interaction, and impacts integrity but not confidentiality or availability. No known exploits are currently reported in the wild, and no official patches are linked in the provided data, though GitLab likely has or will release fixes in subsequent versions. This vulnerability could be exploited remotely by authenticated users to manipulate project data, potentially undermining the integrity of project experiments and workflows within public repositories.
Potential Impact
For European organizations using vulnerable GitLab versions, this vulnerability poses a risk primarily to the integrity of project data, especially in public projects where model experiments can be created improperly. While confidentiality and availability are not directly impacted, unauthorized creation or modification of experiments could disrupt development workflows, lead to data inconsistencies, or introduce malicious or erroneous data into projects. Organizations relying on GitLab for software development, CI/CD pipelines, or collaborative coding could face operational disruptions or reputational damage if attackers exploit this flaw to tamper with project artifacts. Public projects, often used for open-source collaboration or external stakeholder engagement, are particularly at risk. Given the widespread adoption of GitLab in Europe’s technology, finance, and government sectors, this vulnerability could affect critical development infrastructure if not promptly mitigated.
Mitigation Recommendations
European organizations should immediately verify their GitLab version and upgrade to versions 16.2.5 or later, or 16.3.1 or later, where this vulnerability is addressed. Until patches are applied, organizations should restrict access to public projects by limiting authenticated user permissions and reviewing project visibility settings to minimize exposure. Implement strict role-based access controls (RBAC) to ensure only trusted users have permissions to create or modify model experiments. Monitoring and auditing GitLab logs for unusual creation of model experiments can help detect exploitation attempts. Additionally, organizations should consider network-level controls such as IP whitelisting or VPN requirements for accessing GitLab instances to reduce attack surface. Regularly reviewing GitLab security advisories and subscribing to vendor notifications will ensure timely awareness of patches and related vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2023-4018: CWE-425: Direct Request ('Forced Browsing') in GitLab GitLab
Description
An issue has been discovered in GitLab affecting all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1. Due to improper permission validation it was possible to create model experiments in public projects.
AI-Powered Analysis
Technical Analysis
CVE-2023-4018 is a medium-severity vulnerability affecting GitLab versions 16.2 up to but not including 16.2.5, and 16.3 up to but not including 16.3.1. The vulnerability is categorized under CWE-425, which relates to improper permission validation leading to direct request or forced browsing attacks. Specifically, this flaw allows an authenticated user with limited privileges (requiring low privileges but no user interaction) to create model experiments within public projects where such actions should be restricted. The root cause is improper permission checks in GitLab’s handling of model experiment creation, enabling unauthorized actions by bypassing intended access controls. The CVSS 3.1 score is 4.3 (medium), reflecting that the attack vector is network-based, requires low privileges, no user interaction, and impacts integrity but not confidentiality or availability. No known exploits are currently reported in the wild, and no official patches are linked in the provided data, though GitLab likely has or will release fixes in subsequent versions. This vulnerability could be exploited remotely by authenticated users to manipulate project data, potentially undermining the integrity of project experiments and workflows within public repositories.
Potential Impact
For European organizations using vulnerable GitLab versions, this vulnerability poses a risk primarily to the integrity of project data, especially in public projects where model experiments can be created improperly. While confidentiality and availability are not directly impacted, unauthorized creation or modification of experiments could disrupt development workflows, lead to data inconsistencies, or introduce malicious or erroneous data into projects. Organizations relying on GitLab for software development, CI/CD pipelines, or collaborative coding could face operational disruptions or reputational damage if attackers exploit this flaw to tamper with project artifacts. Public projects, often used for open-source collaboration or external stakeholder engagement, are particularly at risk. Given the widespread adoption of GitLab in Europe’s technology, finance, and government sectors, this vulnerability could affect critical development infrastructure if not promptly mitigated.
Mitigation Recommendations
European organizations should immediately verify their GitLab version and upgrade to versions 16.2.5 or later, or 16.3.1 or later, where this vulnerability is addressed. Until patches are applied, organizations should restrict access to public projects by limiting authenticated user permissions and reviewing project visibility settings to minimize exposure. Implement strict role-based access controls (RBAC) to ensure only trusted users have permissions to create or modify model experiments. Monitoring and auditing GitLab logs for unusual creation of model experiments can help detect exploitation attempts. Additionally, organizations should consider network-level controls such as IP whitelisting or VPN requirements for accessing GitLab instances to reduce attack surface. Regularly reviewing GitLab security advisories and subscribing to vendor notifications will ensure timely awareness of patches and related vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitLab
- Date Reserved
- 2023-07-31T12:30:31.240Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682ea68a0acd01a249253f85
Added to database: 5/22/2025, 4:22:34 AM
Last enriched: 7/7/2025, 11:41:51 AM
Last updated: 12/3/2025, 3:41:04 PM
Views: 30
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-57201: n/a
UnknownCVE-2025-57198: n/a
UnknownCVE-2025-57200: n/a
UnknownCVE-2025-65267: n/a
CriticalCVE-2025-53841: CWE-829 Inclusion of Functionality from Untrusted Control Sphere in Akamai Guardicore Platform Agent
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.