CVE-2024-0861: CWE-425: Direct Request ('Forced Browsing') in GitLab GitLab
An issue has been discovered in GitLab EE affecting all versions starting from 16.4 before 16.7.6, all versions starting from 16.8 before 16.8.3, all versions starting from 16.9 before 16.9.1. Users with the `Guest` role can change `Custom dashboard projects` settings contrary to permissions.
AI Analysis
Technical Summary
CVE-2024-0861 is a security vulnerability classified under CWE-425 (Direct Request, also known as Forced Browsing) affecting GitLab Enterprise Edition (EE) versions 16.4 through before 16.7.6, 16.8 through before 16.8.3, and 16.9 before 16.9.1. The flaw allows users assigned the 'Guest' role—normally restricted in permissions—to modify 'Custom dashboard projects' settings, which should be beyond their access rights. This vulnerability arises due to insufficient access control checks on the endpoint handling these settings, enabling unauthorized direct requests to alter configurations. The vulnerability is remotely exploitable over the network without requiring user interaction, but it does require the attacker to have at least Guest-level privileges within the affected GitLab instance. The CVSS v3.1 base score is 4.3 (medium severity), reflecting limited impact on confidentiality and availability but a potential integrity impact due to unauthorized modification of project dashboard settings. No known exploits are currently reported in the wild, and no official patches are linked in the provided data, though GitLab typically addresses such issues in minor version updates. The vulnerability could be leveraged by malicious insiders or external attackers who have obtained Guest access to manipulate project dashboards, potentially misleading users or disrupting project visibility and management workflows.
Potential Impact
For European organizations using GitLab EE versions within the affected ranges, this vulnerability poses a moderate risk primarily to the integrity of project management data. Unauthorized changes to custom dashboard projects could lead to misinformation, misrepresentation of project statuses, or disruption of team workflows. While it does not directly compromise source code confidentiality or system availability, the integrity impact could indirectly affect decision-making and project tracking. Organizations in sectors with strict compliance requirements (e.g., finance, healthcare, government) may face regulatory scrutiny if such unauthorized changes lead to audit failures or operational errors. Additionally, organizations with large, distributed development teams relying heavily on GitLab dashboards for coordination may experience operational inefficiencies or increased risk of insider threats exploiting this vulnerability.
Mitigation Recommendations
European organizations should promptly identify GitLab EE instances running affected versions (16.4 up to before 16.7.6, 16.8 up to before 16.8.3, and 16.9 before 16.9.1) and plan for immediate upgrades to patched versions once available. In the interim, restrict Guest role assignments to trusted users only and audit existing Guest accounts for necessity and legitimacy. Implement strict network segmentation and access controls to limit exposure of GitLab instances to untrusted networks. Monitor GitLab logs for unusual activity related to dashboard settings changes, especially from Guest users. Employ multi-factor authentication (MFA) and strong identity management to reduce the risk of unauthorized Guest access. Consider disabling or limiting custom dashboard features if feasible until patches are applied. Engage with GitLab support or security advisories to obtain official patches or workarounds as soon as they are released.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2024-0861: CWE-425: Direct Request ('Forced Browsing') in GitLab GitLab
Description
An issue has been discovered in GitLab EE affecting all versions starting from 16.4 before 16.7.6, all versions starting from 16.8 before 16.8.3, all versions starting from 16.9 before 16.9.1. Users with the `Guest` role can change `Custom dashboard projects` settings contrary to permissions.
AI-Powered Analysis
Technical Analysis
CVE-2024-0861 is a security vulnerability classified under CWE-425 (Direct Request, also known as Forced Browsing) affecting GitLab Enterprise Edition (EE) versions 16.4 through before 16.7.6, 16.8 through before 16.8.3, and 16.9 before 16.9.1. The flaw allows users assigned the 'Guest' role—normally restricted in permissions—to modify 'Custom dashboard projects' settings, which should be beyond their access rights. This vulnerability arises due to insufficient access control checks on the endpoint handling these settings, enabling unauthorized direct requests to alter configurations. The vulnerability is remotely exploitable over the network without requiring user interaction, but it does require the attacker to have at least Guest-level privileges within the affected GitLab instance. The CVSS v3.1 base score is 4.3 (medium severity), reflecting limited impact on confidentiality and availability but a potential integrity impact due to unauthorized modification of project dashboard settings. No known exploits are currently reported in the wild, and no official patches are linked in the provided data, though GitLab typically addresses such issues in minor version updates. The vulnerability could be leveraged by malicious insiders or external attackers who have obtained Guest access to manipulate project dashboards, potentially misleading users or disrupting project visibility and management workflows.
Potential Impact
For European organizations using GitLab EE versions within the affected ranges, this vulnerability poses a moderate risk primarily to the integrity of project management data. Unauthorized changes to custom dashboard projects could lead to misinformation, misrepresentation of project statuses, or disruption of team workflows. While it does not directly compromise source code confidentiality or system availability, the integrity impact could indirectly affect decision-making and project tracking. Organizations in sectors with strict compliance requirements (e.g., finance, healthcare, government) may face regulatory scrutiny if such unauthorized changes lead to audit failures or operational errors. Additionally, organizations with large, distributed development teams relying heavily on GitLab dashboards for coordination may experience operational inefficiencies or increased risk of insider threats exploiting this vulnerability.
Mitigation Recommendations
European organizations should promptly identify GitLab EE instances running affected versions (16.4 up to before 16.7.6, 16.8 up to before 16.8.3, and 16.9 before 16.9.1) and plan for immediate upgrades to patched versions once available. In the interim, restrict Guest role assignments to trusted users only and audit existing Guest accounts for necessity and legitimacy. Implement strict network segmentation and access controls to limit exposure of GitLab instances to untrusted networks. Monitor GitLab logs for unusual activity related to dashboard settings changes, especially from Guest users. Employ multi-factor authentication (MFA) and strong identity management to reduce the risk of unauthorized Guest access. Consider disabling or limiting custom dashboard features if feasible until patches are applied. Engage with GitLab support or security advisories to obtain official patches or workarounds as soon as they are released.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitLab
- Date Reserved
- 2024-01-24T16:02:22.315Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682ea68a0acd01a249253fe4
Added to database: 5/22/2025, 4:22:34 AM
Last enriched: 7/7/2025, 12:11:21 PM
Last updated: 7/27/2025, 1:13:54 AM
Views: 12
Related Threats
CVE-2025-8854: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in bulletphysics bullet3
HighCVE-2025-8830: OS Command Injection in Linksys RE6250
MediumCVE-2025-54878: CWE-122: Heap-based Buffer Overflow in nasa CryptoLib
HighCVE-2025-40920: CWE-340 Generation of Predictable Numbers or Identifiers in ETHER Catalyst::Authentication::Credential::HTTP
HighCarmaker’s Portal Vulnerability Could Have Allowed Hackers to Unlock Vehicles and Access Data
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.