{"api_version":"1","generated_at":"2026-04-23T08:15:06+00:00","cve":"CVE-2022-38183","urls":{"html":"https://cve.report/CVE-2022-38183","api":"https://cve.report/api/cve/CVE-2022-38183.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-38183","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-38183"},"summary":{"title":"CVE-2022-38183","description":"In Gitea before 1.16.9, it was possible for users to add existing issues to projects. Due to improper access controls, an attacker could assign any issue to any project in Gitea (there was no permission check for fetching the issue). As a result, the attacker would get access to private issue titles.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2022-08-12 20:15:00","updated_at":"2023-08-08 14:22:00"},"problem_types":["CWE-862"],"metrics":[],"references":[{"url":"https://blog.gitea.io/2022/07/gitea-1.16.9-is-released/","name":"https://blog.gitea.io/2022/07/gitea-1.16.9-is-released/","refsource":"MISC","tags":[],"title":"Gitea 1.16.9 is released - Blog","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.gentoo.org/glsa/202210-14","name":"GLSA-202210-14","refsource":"GENTOO","tags":[],"title":"Gitea: Multiple Vulnerabilities (GLSA 202210-14) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://herolab.usd.de/security-advisories/usd-2022-0015/","name":"https://herolab.usd.de/security-advisories/usd-2022-0015/","refsource":"MISC","tags":[],"title":"usd-2022-0015 | Broken Access Control in Gitea - usd HeroLab","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-38183","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-38183","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"38183","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"gitea","cpe5":"gitea","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-38183","qid":"710660","title":"Gentoo Linux Gitea Multiple Vulnerabilities (GLSA 202210-14)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2022-38183","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In Gitea before 1.16.9, it was possible for users to add existing issues to projects. Due to improper access controls, an attacker could assign any issue to any project in Gitea (there was no permission check for fetching the issue). As a result, the attacker would get access to private issue titles."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://blog.gitea.io/2022/07/gitea-1.16.9-is-released/","refsource":"MISC","name":"https://blog.gitea.io/2022/07/gitea-1.16.9-is-released/"},{"url":"https://herolab.usd.de/security-advisories/usd-2022-0015/","refsource":"MISC","name":"https://herolab.usd.de/security-advisories/usd-2022-0015/"},{"refsource":"GENTOO","name":"GLSA-202210-14","url":"https://security.gentoo.org/glsa/202210-14"}]}},"nvd":{"publishedDate":"2022-08-12 20:15:00","lastModifiedDate":"2023-08-08 14:22:00","problem_types":["CWE-862"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:gitea:gitea:*:*:*:*:*:*:*:*","versionEndExcluding":"1.16.9","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}