Home

Description

An issue has been discovered in GitLab EE affecting all versions starting from 16.1 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1. If an external user is given an owner role on any group, that external user may escalate their privileges on the instance by creating a service account in that group. This service account is not classified as external and may be used to access internal projects.

PUBLISHED Reserved 2023-07-25 | Published 2023-09-01 | Updated 2025-11-20 | Assigner GitLab




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

Problem types

CWE-279: Incorrect Execution-Assigned Permissions

Product status

Default status
unaffected

16.1 (semver) before 16.1.5
affected

16.2 (semver) before 16.2.5
affected

16.3 (semver) before 16.3.1
affected

Credits

Thanks [joaxcar](https://hackerone.com/joaxcar) for reporting this vulnerability through our HackerOne bug bounty program finder

References

gitlab.com/gitlab-org/gitlab/-/issues/417664 (GitLab Issue #417664) issue-tracking

hackerone.com/reports/2040834 (HackerOne Bug Bounty Report #2040834) technical-description exploit

gitlab.com/gitlab-org/gitlab/-/issues/417664 (GitLab Issue #417664) issue-tracking

hackerone.com/reports/2040834 (HackerOne Bug Bounty Report #2040834) technical-description exploit permissions-required

cve.org (CVE-2023-3915)

nvd.nist.gov (CVE-2023-3915)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.