5.4 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 Medium
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
52.3%
An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.4 before 15.5.7, all versions starting from 15.6 before 15.6.4, all versions starting from 15.7 before 15.7.2. Due to the improper filtering of query parameters in the wiki changes page, an attacker can execute arbitrary JavaScript on the self-hosted instances running without strict CSP.
CPE | Name | Operator | Version |
---|---|---|---|
gitlab:gitlab | gitlab | lt | 15.5.7 |
gitlab:gitlab | gitlab | lt | 15.6.4 |
gitlab:gitlab | gitlab | lt | 15.7.2 |
[
{
"vendor": "GitLab",
"product": "GitLab",
"versions": [
{
"version": ">=15.4, <15.5.7",
"status": "affected"
},
{
"version": ">=15.6, <15.6.4",
"status": "affected"
},
{
"version": ">=15.7, <15.7.2",
"status": "affected"
}
]
}
]
5.4 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 Medium
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
52.3%