CVE-2023-5009: CWE-863: Incorrect Authorization in GitLab GitLab
An issue has been discovered in GitLab EE affecting all versions starting from 13.12 before 16.2.7, all versions starting from 16.3 before 16.3.4. It was possible for an attacker to run pipeline jobs as an arbitrary user via scheduled security scan policies. This was a bypass of [CVE-2023-3932](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3932) showing additional impact.
AI Analysis
Technical Summary
CVE-2023-5009 is a critical security vulnerability identified in GitLab Enterprise Edition (EE) affecting all versions from 13.12 up to but not including 16.2.7, and versions from 16.3 up to but not including 16.3.4. The vulnerability is classified under CWE-863, which pertains to incorrect authorization. Specifically, this flaw allows an attacker to execute pipeline jobs as an arbitrary user by exploiting scheduled security scan policies. This means an attacker with limited privileges can bypass intended access controls and escalate their permissions to impersonate other users within the GitLab environment. The vulnerability is a bypass of a previously known issue (CVE-2023-3932), but with additional impact, indicating a broader scope or more severe consequences. The CVSS v3.1 base score is 9.6, reflecting a critical severity level. The vector string (AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N) indicates that the attack can be performed remotely over the network, requires low privileges, no user interaction, and results in a complete breach of confidentiality and integrity with no impact on availability. The vulnerability affects the core CI/CD pipeline functionality, which is central to software development workflows in GitLab, making it a highly sensitive and impactful flaw. No known exploits are currently reported in the wild, but the high severity and the nature of the vulnerability suggest that exploitation could lead to unauthorized code execution, data leakage, or manipulation of build processes.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying heavily on GitLab EE for their software development lifecycle. Unauthorized execution of pipeline jobs as arbitrary users can lead to unauthorized access to sensitive source code, credentials, and deployment environments. This can result in intellectual property theft, insertion of malicious code into software builds, and potential compromise of downstream production systems. The breach of confidentiality and integrity can undermine trust in software supply chains, which is critical for sectors such as finance, healthcare, telecommunications, and government agencies prevalent in Europe. Additionally, the cross-tenant impact (scope: changed) means that a compromise in one project or user context could affect others, amplifying the risk in multi-tenant or large enterprise environments. Given the widespread adoption of GitLab in European tech ecosystems, the vulnerability could disrupt development operations and lead to regulatory compliance issues under GDPR if personal data is exposed or manipulated.
Mitigation Recommendations
European organizations should prioritize immediate patching of GitLab EE to versions 16.2.7 or later and 16.3.4 or later where this vulnerability is fixed. Until patches are applied, organizations should restrict access to scheduled security scan policies and pipeline configuration to only highly trusted administrators. Implement strict role-based access controls (RBAC) and audit all pipeline job executions for anomalous behavior. Disable or limit the use of scheduled security scans if feasible. Network-level protections such as firewall rules and VPNs should be enforced to limit exposure of GitLab instances to untrusted networks. Additionally, organizations should monitor GitLab logs for unusual pipeline job executions and user impersonation attempts. Employing runtime application self-protection (RASP) or endpoint detection and response (EDR) tools can help detect exploitation attempts. Finally, organizations should review and harden their CI/CD pipeline security policies, including secrets management and artifact integrity verification, to reduce the impact of any potential compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Belgium
CVE-2023-5009: CWE-863: Incorrect Authorization in GitLab GitLab
Description
An issue has been discovered in GitLab EE affecting all versions starting from 13.12 before 16.2.7, all versions starting from 16.3 before 16.3.4. It was possible for an attacker to run pipeline jobs as an arbitrary user via scheduled security scan policies. This was a bypass of [CVE-2023-3932](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3932) showing additional impact.
AI-Powered Analysis
Technical Analysis
CVE-2023-5009 is a critical security vulnerability identified in GitLab Enterprise Edition (EE) affecting all versions from 13.12 up to but not including 16.2.7, and versions from 16.3 up to but not including 16.3.4. The vulnerability is classified under CWE-863, which pertains to incorrect authorization. Specifically, this flaw allows an attacker to execute pipeline jobs as an arbitrary user by exploiting scheduled security scan policies. This means an attacker with limited privileges can bypass intended access controls and escalate their permissions to impersonate other users within the GitLab environment. The vulnerability is a bypass of a previously known issue (CVE-2023-3932), but with additional impact, indicating a broader scope or more severe consequences. The CVSS v3.1 base score is 9.6, reflecting a critical severity level. The vector string (AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N) indicates that the attack can be performed remotely over the network, requires low privileges, no user interaction, and results in a complete breach of confidentiality and integrity with no impact on availability. The vulnerability affects the core CI/CD pipeline functionality, which is central to software development workflows in GitLab, making it a highly sensitive and impactful flaw. No known exploits are currently reported in the wild, but the high severity and the nature of the vulnerability suggest that exploitation could lead to unauthorized code execution, data leakage, or manipulation of build processes.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying heavily on GitLab EE for their software development lifecycle. Unauthorized execution of pipeline jobs as arbitrary users can lead to unauthorized access to sensitive source code, credentials, and deployment environments. This can result in intellectual property theft, insertion of malicious code into software builds, and potential compromise of downstream production systems. The breach of confidentiality and integrity can undermine trust in software supply chains, which is critical for sectors such as finance, healthcare, telecommunications, and government agencies prevalent in Europe. Additionally, the cross-tenant impact (scope: changed) means that a compromise in one project or user context could affect others, amplifying the risk in multi-tenant or large enterprise environments. Given the widespread adoption of GitLab in European tech ecosystems, the vulnerability could disrupt development operations and lead to regulatory compliance issues under GDPR if personal data is exposed or manipulated.
Mitigation Recommendations
European organizations should prioritize immediate patching of GitLab EE to versions 16.2.7 or later and 16.3.4 or later where this vulnerability is fixed. Until patches are applied, organizations should restrict access to scheduled security scan policies and pipeline configuration to only highly trusted administrators. Implement strict role-based access controls (RBAC) and audit all pipeline job executions for anomalous behavior. Disable or limit the use of scheduled security scans if feasible. Network-level protections such as firewall rules and VPNs should be enforced to limit exposure of GitLab instances to untrusted networks. Additionally, organizations should monitor GitLab logs for unusual pipeline job executions and user impersonation attempts. Employing runtime application self-protection (RASP) or endpoint detection and response (EDR) tools can help detect exploitation attempts. Finally, organizations should review and harden their CI/CD pipeline security policies, including secrets management and artifact integrity verification, to reduce the impact of any potential compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitLab
- Date Reserved
- 2023-09-15T22:30:36.931Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682ea68a0acd01a249253fa4
Added to database: 5/22/2025, 4:22:34 AM
Last enriched: 7/7/2025, 11:55:18 AM
Last updated: 8/17/2025, 7:01:18 PM
Views: 23
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.