{"api_version":"1","generated_at":"2026-04-21T17:07:20+00:00","cve":"CVE-2022-4167","urls":{"html":"https://cve.report/CVE-2022-4167","api":"https://cve.report/api/cve/CVE-2022-4167.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-4167","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-4167"},"summary":{"title":"CVE-2022-4167","description":"Incorrect Authorization check affecting all versions of GitLab EE from 13.11 prior to 15.5.7, 15.6 prior to 15.6.4, and 15.7 prior to 15.7.2 allows group access tokens to continue working even after the group owner loses the ability to revoke them.","state":"PUBLIC","assigner":"cve@gitlab.com","published_at":"2023-01-12 04:15:00","updated_at":"2023-01-18 20:32:00"},"problem_types":["CWE-863"],"metrics":[],"references":[{"url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4167.json","name":"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4167.json","refsource":"CONFIRM","tags":[],"title":"2022/CVE-2022-4167.json · master · GitLab.org / cves · GitLab","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://gitlab.com/gitlab-org/gitlab/-/issues/367740","name":"https://gitlab.com/gitlab-org/gitlab/-/issues/367740","refsource":"MISC","tags":[],"title":"Not Found","mime":"text/html","httpstatus":"404","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-4167","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-4167","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"This vulnerability was reported to us by a customer","lang":""}],"nvd_cpes":[{"cve_year":"2022","cve_id":"4167","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"gitlab","cpe5":"gitlab","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"enterprise","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-4167","qid":"691022","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for gitlab (3a023570-91ab-11ed-8950-001b217b3468)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2022-4167","ASSIGNER":"cve@gitlab.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"GitLab","product":{"product_data":[{"product_name":"GitLab","version":{"version_data":[{"version_value":">=13.11, <15.5.7"},{"version_value":">=15.6, <15.6.4"},{"version_value":">=15.7, <15.7.2"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Improper authorization in GitLab"}]}]},"references":{"reference_data":[{"name":"https://gitlab.com/gitlab-org/gitlab/-/issues/367740","url":"https://gitlab.com/gitlab-org/gitlab/-/issues/367740","refsource":"MISC"},{"name":"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4167.json","url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4167.json","refsource":"CONFIRM"}]},"description":{"description_data":[{"lang":"eng","value":"Incorrect Authorization check affecting all versions of GitLab EE from 13.11 prior to 15.5.7, 15.6 prior to 15.6.4, and 15.7 prior to 15.7.2 allows group access tokens to continue working even after the group owner loses the ability to revoke them."}]},"impact":{"cvss":{"vectorString":"AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N","attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","version":"3.1","baseScore":5.2,"baseSeverity":"MEDIUM"}},"credit":[{"lang":"eng","value":"This vulnerability was reported to us by a customer"}]},"nvd":{"publishedDate":"2023-01-12 04:15:00","lastModifiedDate":"2023-01-18 20:32:00","problem_types":["CWE-863"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"15.7.0","versionEndExcluding":"15.7.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"15.6.0","versionEndExcluding":"15.6.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"13.11.0","versionEndExcluding":"15.5.7","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}