CVE-2024-0456: CWE-425: Direct Request ('Forced Browsing') in GitLab GitLab
An authorization vulnerability exists in GitLab versions 14.0 prior to 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1. An unauthorized attacker is able to assign arbitrary users to MRs that they created within the project
AI Analysis
Technical Summary
CVE-2024-0456 is an authorization vulnerability identified in GitLab, affecting versions from 14.0 up to but not including 16.6.6, versions 16.7 up to but not including 16.7.4, and versions 16.8 up to but not including 16.8.1. The vulnerability is categorized under CWE-425, which relates to Direct Request or Forced Browsing issues. Specifically, this flaw allows an unauthorized attacker who has created Merge Requests (MRs) within a project to assign arbitrary users to those MRs without proper authorization checks. This means that an attacker with at least limited project access and the ability to create MRs can manipulate the assignment of users to MRs, potentially causing confusion, misattribution of code reviews, or manipulation of project workflows. The vulnerability does not allow direct access to confidential data or modification of code but impacts the integrity of project management processes by undermining proper authorization controls. The CVSS v3.1 base score is 4.3 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), low integrity impact (I:L), and no availability impact (A:N). There are no known exploits in the wild reported at this time, and no patch links were provided in the source data, but it is expected that GitLab has or will release patches in versions 16.6.6, 16.7.4, and 16.8.1 to address this issue.
Potential Impact
For European organizations using GitLab for source code management and collaboration, this vulnerability can disrupt development workflows by allowing unauthorized assignment of users to merge requests. This could lead to improper code review assignments, potential delays in development cycles, and confusion among development teams. While it does not directly expose sensitive data or allow code modification by unauthorized users, the integrity of project management and review processes is compromised. In regulated industries or organizations with strict compliance requirements, such manipulation could have downstream effects on audit trails and accountability. Additionally, attackers could leverage this flaw as part of a broader attack chain to sow discord or misattribute responsibility within development teams, potentially facilitating social engineering or insider threat scenarios. The impact is more pronounced in large organizations with complex project structures and multiple contributors, common in European enterprises and public sector entities.
Mitigation Recommendations
European organizations should prioritize upgrading GitLab instances to the fixed versions 16.6.6, 16.7.4, or 16.8.1 as soon as these patches are available. Until patches are applied, organizations should implement strict access controls limiting who can create merge requests and assign users within projects, ideally restricting this capability to trusted personnel. Monitoring and auditing merge request assignments for unusual changes or unauthorized user assignments can help detect exploitation attempts. Additionally, organizations can enforce multi-factor authentication and review project membership regularly to minimize the risk of privilege abuse. If immediate patching is not feasible, consider temporarily disabling or restricting merge request assignment features or workflows that allow arbitrary user assignments. Finally, maintain awareness of GitLab security advisories and subscribe to vendor notifications to ensure timely response to updates.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy, Spain
CVE-2024-0456: CWE-425: Direct Request ('Forced Browsing') in GitLab GitLab
Description
An authorization vulnerability exists in GitLab versions 14.0 prior to 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1. An unauthorized attacker is able to assign arbitrary users to MRs that they created within the project
AI-Powered Analysis
Technical Analysis
CVE-2024-0456 is an authorization vulnerability identified in GitLab, affecting versions from 14.0 up to but not including 16.6.6, versions 16.7 up to but not including 16.7.4, and versions 16.8 up to but not including 16.8.1. The vulnerability is categorized under CWE-425, which relates to Direct Request or Forced Browsing issues. Specifically, this flaw allows an unauthorized attacker who has created Merge Requests (MRs) within a project to assign arbitrary users to those MRs without proper authorization checks. This means that an attacker with at least limited project access and the ability to create MRs can manipulate the assignment of users to MRs, potentially causing confusion, misattribution of code reviews, or manipulation of project workflows. The vulnerability does not allow direct access to confidential data or modification of code but impacts the integrity of project management processes by undermining proper authorization controls. The CVSS v3.1 base score is 4.3 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), low integrity impact (I:L), and no availability impact (A:N). There are no known exploits in the wild reported at this time, and no patch links were provided in the source data, but it is expected that GitLab has or will release patches in versions 16.6.6, 16.7.4, and 16.8.1 to address this issue.
Potential Impact
For European organizations using GitLab for source code management and collaboration, this vulnerability can disrupt development workflows by allowing unauthorized assignment of users to merge requests. This could lead to improper code review assignments, potential delays in development cycles, and confusion among development teams. While it does not directly expose sensitive data or allow code modification by unauthorized users, the integrity of project management and review processes is compromised. In regulated industries or organizations with strict compliance requirements, such manipulation could have downstream effects on audit trails and accountability. Additionally, attackers could leverage this flaw as part of a broader attack chain to sow discord or misattribute responsibility within development teams, potentially facilitating social engineering or insider threat scenarios. The impact is more pronounced in large organizations with complex project structures and multiple contributors, common in European enterprises and public sector entities.
Mitigation Recommendations
European organizations should prioritize upgrading GitLab instances to the fixed versions 16.6.6, 16.7.4, or 16.8.1 as soon as these patches are available. Until patches are applied, organizations should implement strict access controls limiting who can create merge requests and assign users within projects, ideally restricting this capability to trusted personnel. Monitoring and auditing merge request assignments for unusual changes or unauthorized user assignments can help detect exploitation attempts. Additionally, organizations can enforce multi-factor authentication and review project membership regularly to minimize the risk of privilege abuse. If immediate patching is not feasible, consider temporarily disabling or restricting merge request assignment features or workflows that allow arbitrary user assignments. Finally, maintain awareness of GitLab security advisories and subscribe to vendor notifications to ensure timely response to updates.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitLab
- Date Reserved
- 2024-01-12T08:02:33.279Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68387d4f182aa0cae28316b8
Added to database: 5/29/2025, 3:29:19 PM
Last enriched: 7/7/2025, 11:39:52 PM
Last updated: 7/31/2025, 12:09:36 AM
Views: 10
Related Threats
CVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumCVE-2025-8142: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in pencidesign Soledad
HighCVE-2025-8105: CWE-94 Improper Control of Generation of Code ('Code Injection') in pencidesign Soledad
HighCVE-2025-8719: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.