Description
When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is disabled
CISA Known Exploited Vulnerability
Date added 2026-02-18 | Due date 2026-03-11
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Problem types
Server-side request forgery (ssrf) in GitLab
Product status
>=13.7, <13.7.7
>=13.8, <13.8.4
Credits
Thanks [@myster](https://hackerone.com/myster?type=user) for reporting this vulnerability through our HackerOne bug bounty program
References
gitlab.com/gitlab-org/gitlab/-/issues/294178
gitlab.com/...rg/cves/-/blob/master/2021/CVE-2021-22175.json
www.cisa.gov/...erabilities-catalog?field_cve=CVE-2021-22175
gitlab.com/gitlab-org/gitlab/-/issues/294178
gitlab.com/...rg/cves/-/blob/master/2021/CVE-2021-22175.json