CVE-2023-2825

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-2825
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-2825.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-2825
Aliases
Downstream
Published
2023-05-26T00:00:00Z
Modified
2025-12-04T23:45:15.094524Z
Severity
  • 10.0 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N CVSS Calculator
Summary
[none]
Details

An issue has been discovered in GitLab CE/EE affecting only version 16.0.0. An unauthenticated malicious user can use a path traversal vulnerability to read arbitrary files on the server when an attachment exists in a public project nested within at least five groups.

Database specific
{
    "cna_assigner": "GitLab",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/2xxx/CVE-2023-2825.json"
}
References

Affected packages

Git /

Affected ranges