CVE-2023-3907

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-3907
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-3907.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-3907
Aliases
Downstream
Published
2023-12-17T23:02:36.694Z
Modified
2025-11-20T21:20:26.601570Z
Severity
  • 4.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
Improper User Management in GitLab
Details

A privilege escalation vulnerability in GitLab EE affecting all versions from 16.0 prior to 16.4.4, 16.5 prior to 16.5.4, and 16.6 prior to 16.6.2 allows a project Maintainer to use a Project Access Token to escalate their role to Owner

Database specific
{
    "cwe_ids": [
        "CWE-286"
    ]
}
References

Affected packages

Git / gitlab.com/gitlab-org/gitlab

Affected ranges

Type
GIT
Repo
https://gitlab.com/gitlab-org/gitlab
Events
Database specific
{
    "versions": [
        {
            "introduced": "16.0"
        },
        {
            "fixed": "16.4.4"
        }
    ]
}
Type
GIT
Repo
https://gitlab.com/gitlab-org/gitlab
Events
Database specific
{
    "versions": [
        {
            "introduced": "16.5"
        },
        {
            "fixed": "16.5.4"
        }
    ]
}
Type
GIT
Repo
https://gitlab.com/gitlab-org/gitlab
Events
Database specific
{
    "versions": [
        {
            "introduced": "16.6"
        },
        {
            "fixed": "16.6.2"
        }
    ]
}

Affected versions

v16.*

v16.5.0-ee
v16.5.1-ee
v16.5.2-ee
v16.5.3-ee
v16.6.0-ee
v16.6.1-ee