CVE-2023-5612: CWE-862: Missing Authorization in GitLab GitLab
An issue has been discovered in GitLab affecting all versions before 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1. It was possible to read the user email address via tags feed although the visibility in the user profile has been disabled.
AI Analysis
Technical Summary
CVE-2023-5612 is a medium-severity vulnerability affecting GitLab versions prior to 16.6.6, 16.7 before 16.7.4, and 16.8 before 16.8.1. The vulnerability is classified under CWE-862, which refers to missing authorization. Specifically, this flaw allows unauthorized users to read the email addresses of GitLab users via the tags feed feature, even when the user profile visibility settings have been configured to hide email addresses. This indicates an authorization bypass where access controls intended to protect user email information are not properly enforced in the tags feed endpoint. The vulnerability has a CVSS 3.1 base score of 5.3, reflecting a medium severity level. The vector indicates that the attack can be performed remotely over the network (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it relatively easy to exploit. However, the impact is limited to confidentiality loss of user email addresses, with no impact on integrity or availability. There are no known exploits in the wild at the time of publication, and no official patch links were provided in the data, though GitLab has released fixed versions. This vulnerability could be leveraged by attackers to harvest email addresses for phishing campaigns or social engineering attacks, potentially increasing the risk of targeted attacks on GitLab users or organizations using GitLab.
Potential Impact
For European organizations using GitLab, this vulnerability poses a privacy and confidentiality risk. Exposure of user email addresses can facilitate spear-phishing, social engineering, and targeted attacks against employees or contractors. This is particularly concerning for organizations subject to strict data protection regulations such as GDPR, where unauthorized disclosure of personal data (including email addresses) can lead to regulatory penalties and reputational damage. While the vulnerability does not allow modification or disruption of services, the leakage of email addresses can serve as a stepping stone for more sophisticated attacks. Organizations with large development teams or those using GitLab for critical projects may face increased risk. Additionally, the breach of user privacy could undermine trust in internal collaboration platforms. Given the ease of exploitation without authentication or user interaction, attackers could automate the collection of email addresses at scale.
Mitigation Recommendations
European organizations should promptly upgrade GitLab to versions 16.6.6, 16.7.4, 16.8.1 or later where this vulnerability is fixed. Until patching is complete, organizations can mitigate risk by restricting access to the GitLab instance to trusted networks or VPNs to reduce exposure to unauthorized users. Review and tighten access controls and visibility settings for user profiles and tags feeds. Monitor logs for unusual access patterns to the tags feed endpoint that could indicate reconnaissance activity. Implement email filtering and user awareness training to reduce the impact of potential phishing attacks leveraging harvested email addresses. Consider deploying Web Application Firewalls (WAFs) with rules to detect and block suspicious requests targeting the tags feed. Finally, maintain an inventory of GitLab users and regularly audit permissions to ensure minimal exposure of sensitive information.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2023-5612: CWE-862: Missing Authorization in GitLab GitLab
Description
An issue has been discovered in GitLab affecting all versions before 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1. It was possible to read the user email address via tags feed although the visibility in the user profile has been disabled.
AI-Powered Analysis
Technical Analysis
CVE-2023-5612 is a medium-severity vulnerability affecting GitLab versions prior to 16.6.6, 16.7 before 16.7.4, and 16.8 before 16.8.1. The vulnerability is classified under CWE-862, which refers to missing authorization. Specifically, this flaw allows unauthorized users to read the email addresses of GitLab users via the tags feed feature, even when the user profile visibility settings have been configured to hide email addresses. This indicates an authorization bypass where access controls intended to protect user email information are not properly enforced in the tags feed endpoint. The vulnerability has a CVSS 3.1 base score of 5.3, reflecting a medium severity level. The vector indicates that the attack can be performed remotely over the network (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it relatively easy to exploit. However, the impact is limited to confidentiality loss of user email addresses, with no impact on integrity or availability. There are no known exploits in the wild at the time of publication, and no official patch links were provided in the data, though GitLab has released fixed versions. This vulnerability could be leveraged by attackers to harvest email addresses for phishing campaigns or social engineering attacks, potentially increasing the risk of targeted attacks on GitLab users or organizations using GitLab.
Potential Impact
For European organizations using GitLab, this vulnerability poses a privacy and confidentiality risk. Exposure of user email addresses can facilitate spear-phishing, social engineering, and targeted attacks against employees or contractors. This is particularly concerning for organizations subject to strict data protection regulations such as GDPR, where unauthorized disclosure of personal data (including email addresses) can lead to regulatory penalties and reputational damage. While the vulnerability does not allow modification or disruption of services, the leakage of email addresses can serve as a stepping stone for more sophisticated attacks. Organizations with large development teams or those using GitLab for critical projects may face increased risk. Additionally, the breach of user privacy could undermine trust in internal collaboration platforms. Given the ease of exploitation without authentication or user interaction, attackers could automate the collection of email addresses at scale.
Mitigation Recommendations
European organizations should promptly upgrade GitLab to versions 16.6.6, 16.7.4, 16.8.1 or later where this vulnerability is fixed. Until patching is complete, organizations can mitigate risk by restricting access to the GitLab instance to trusted networks or VPNs to reduce exposure to unauthorized users. Review and tighten access controls and visibility settings for user profiles and tags feeds. Monitor logs for unusual access patterns to the tags feed endpoint that could indicate reconnaissance activity. Implement email filtering and user awareness training to reduce the impact of potential phishing attacks leveraging harvested email addresses. Consider deploying Web Application Firewalls (WAFs) with rules to detect and block suspicious requests targeting the tags feed. Finally, maintain an inventory of GitLab users and regularly audit permissions to ensure minimal exposure of sensitive information.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitLab
- Date Reserved
- 2023-10-17T11:30:31.181Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682ea68a0acd01a249253fbd
Added to database: 5/22/2025, 4:22:34 AM
Last enriched: 7/7/2025, 11:57:03 AM
Last updated: 8/15/2025, 2:43:22 PM
Views: 12
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.