{"api_version":"1","generated_at":"2026-04-23T09:53:19+00:00","cve":"CVE-2023-2022","urls":{"html":"https://cve.report/CVE-2023-2022","api":"https://cve.report/api/cve/CVE-2023-2022.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-2022","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-2022"},"summary":{"title":"CVE-2023-2022","description":"An issue has been discovered in GitLab CE/EE affecting all versions starting before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2, which leads to developers being able to create pipeline schedules on protected branches even if they don't have access to merge","state":"PUBLIC","assigner":"cve@gitlab.com","published_at":"2023-08-02 09:15:00","updated_at":"2023-08-05 03:45:00"},"problem_types":["NVD-CWE-Other"],"metrics":[],"references":[{"url":"https://hackerone.com/reports/1936572","name":"https://hackerone.com/reports/1936572","refsource":"MISC","tags":[],"title":"Just a moment...","mime":"text/html","httpstatus":"403","archivestatus":"404"},{"url":"https://gitlab.com/gitlab-org/gitlab/-/issues/407166","name":"https://gitlab.com/gitlab-org/gitlab/-/issues/407166","refsource":"MISC","tags":[],"title":"Not Found","mime":"text/html","httpstatus":"404","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-2022","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2022","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"2022","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"gitlab","cpe5":"gitlab","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"community","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"2022","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"gitlab","cpe5":"gitlab","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"enterprise","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-2022","qid":"378912","title":"GitLab Multiple Security Vulnerabilities (GitLab Security Release: 16.2.2, 16.1.3, and 16.0.8)"},{"cve":"CVE-2023-2022","qid":"691223","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for gitlab (fa239535-30f6-11ee-aef9-001b217b3468)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-2022","ASSIGNER":"cve@gitlab.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"An issue has been discovered in GitLab CE/EE affecting all versions starting before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2, which leads to developers being able to create pipeline schedules on protected branches even if they don't have access to merge"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-284: Improper Access Control","cweId":"CWE-284"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"GitLab","product":{"product_data":[{"product_name":"GitLab","version":{"version_data":[{"version_affected":"<","version_name":"0","version_value":"16.0.8"},{"version_affected":"<","version_name":"16.1.0","version_value":"16.1.3"},{"version_affected":"<","version_name":"16.2.0","version_value":"16.2.2"}]}}]}}]}},"references":{"reference_data":[{"url":"https://gitlab.com/gitlab-org/gitlab/-/issues/407166","refsource":"MISC","name":"https://gitlab.com/gitlab-org/gitlab/-/issues/407166"},{"url":"https://hackerone.com/reports/1936572","refsource":"MISC","name":"https://hackerone.com/reports/1936572"}]},"solution":[{"lang":"en","value":"Upgrade to versions 16.2.2, 16.1.3, 16.0.8 or above."}],"credits":[{"lang":"en","value":"Thanks [js_noob](https://hackerone.com/js_noob) for reporting this vulnerability through our HackerOne bug bounty program"}],"impact":{"cvss":[{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM"}]}},"nvd":{"publishedDate":"2023-08-02 09:15:00","lastModifiedDate":"2023-08-05 03:45:00","problem_types":["NVD-CWE-Other"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":1.4}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"16.2","versionEndExcluding":"16.2.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*","versionStartIncluding":"16.2","versionEndExcluding":"16.2.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*","versionStartIncluding":"16.1","versionEndExcluding":"16.1.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"16.1","versionEndExcluding":"16.1.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*","versionEndExcluding":"16.0.8","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*","versionEndExcluding":"16.0.8","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}