CVE-2023-0485
GitLab vulnerability analysis and mitigation

Overview

A vulnerability was discovered in GitLab affecting all versions from 13.11 before 15.8.5, all versions from 15.9 before 15.9.4, and all versions from 15.10 before 15.10.1. The vulnerability allowed project members who were demoted to guest role to read project updates by performing a diff comparison with a pre-existing fork (GitLab Security, CVE Mitre).

Technical details

The vulnerability has been assigned a CVSS score of 6.5 (Medium severity) with the vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N. The issue specifically involves the 'Compare Git revisions' feature, where although security checks were properly implemented in the UI, the API lacked sufficient access controls. This allowed users with guest permissions to access repository content through the API endpoint for comparing revisions when they had access to a fork of the project (GitLab Security).

Impact

The vulnerability allowed unauthorized access to private project updates. Specifically, users who had been demoted from higher access levels to guest role could still read new code changes by comparing the current state with a pre-existing fork. This effectively bypassed the intended access restrictions for guest users in private projects (GitLab Issue).

Mitigation and workarounds

The vulnerability was patched in GitLab versions 15.8.5, 15.9.4, and 15.10.1. Organizations are strongly recommended to upgrade to these or newer versions immediately. The fix was released as part of a security release that addressed multiple vulnerabilities (GitLab Security).

Community reactions

The vulnerability was initially reported through GitLab's HackerOne bug bounty program by security researcher shells3c. GitLab addressed the issue promptly through their security release process, demonstrating their commitment to addressing security vulnerabilities (GitLab Security).

Additional resources


SourceThis report was generated using AI

Related GitLab vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-12571HIGH7.5
  • GitLabGitLab
  • cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
NoYesNov 26, 2025
CVE-2025-7449MEDIUM6.5
  • GitLabGitLab
  • cpe:2.3:a:gitlab:gitlab
NoYesNov 26, 2025
CVE-2025-12653MEDIUM6.5
  • GitLabGitLab
  • cpe:2.3:a:gitlab:gitlab
NoYesNov 26, 2025
CVE-2025-13611MEDIUM5.3
  • GitLabGitLab
  • cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
NoYesNov 26, 2025
CVE-2025-6195MEDIUM4.3
  • GitLabGitLab
  • gitlab
NoYesNov 26, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management