Home

Description

An issue has been discovered in GitLab EE affecting all versions starting from 13.12 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. It was possible for an attacker to run pipeline jobs as an arbitrary user via scheduled security scan policies.

PUBLISHED Reserved 2023-07-25 | Published 2023-08-03 | Updated 2025-11-20 | Assigner GitLab




MEDIUM: 5.3CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N

Problem types

CWE-286: Incorrect User Management

Product status

Default status
unaffected

13.12 (semver) before 16.0.8
affected

16.1.0 (semver) before 16.1.3
affected

16.2.0 (semver) before 16.2.2
affected

Credits

Thanks [vaib25vicky](https://hackerone.com/vaib25vicky) for reporting this vulnerability through our HackerOne bug bounty program finder

References

gitlab.com/gitlab-org/gitlab/-/issues/417594 (GitLab Issue #417594) issue-tracking

hackerone.com/reports/2057633 (HackerOne Bug Bounty Report #2057633) technical-description exploit

gitlab.com/gitlab-org/gitlab/-/issues/417594 (GitLab Issue #417594) issue-tracking

hackerone.com/reports/2057633 (HackerOne Bug Bounty Report #2057633) technical-description exploit permissions-required

cve.org (CVE-2023-3932)

nvd.nist.gov (CVE-2023-3932)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.