Home

Description

An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.1 before 16.7.6, all versions starting from 16.8 before 16.8.3, all versions starting from 16.9 before 16.9.1. Under some specialized conditions, an LDAP user may be able to reset their password using their verified secondary email address and sign-in using direct authentication with the reset password, bypassing LDAP.

PUBLISHED Reserved 2024-02-15 | Published 2024-02-21 | Updated 2026-05-11 | Assigner GitLab




MEDIUM: 5.3CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N

Problem types

CWE-288: Authentication Bypass Using an Alternate Path or Channel

Product status

Default status
unaffected

16.1 (semver) before 16.7.6
affected

16.8 (semver) before 16.8.3
affected

16.9 (semver) before 16.9.1
affected

Credits

This vulnerability was discovered internally by a GitLab team member, [Drew Blessing](https://gitlab.com/dblessing) finder

References

gitlab.com/gitlab-org/gitlab/-/issues/438144 (GitLab Issue #438144) issue-tracking

gitlab.com/gitlab-org/gitlab/-/issues/438144 (GitLab Issue #438144) issue-tracking

cve.org (CVE-2024-1525)

nvd.nist.gov (CVE-2024-1525)

Download JSON