{"api_version":"1","generated_at":"2026-04-23T04:20:46+00:00","cve":"CVE-2023-2182","urls":{"html":"https://cve.report/CVE-2023-2182","api":"https://cve.report/api/cve/CVE-2023-2182.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-2182","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-2182"},"summary":{"title":"CVE-2023-2182","description":"An issue has been discovered in GitLab EE affecting all versions starting from 15.10 before 15.10.5, all versions starting from 15.11 before 15.11.1. Under certain conditions when OpenID Connect is enabled on an instance, it may allow users who are marked as 'external' to become 'regular' users thus leading to privilege escalation for those users.","state":"PUBLIC","assigner":"cve@gitlab.com","published_at":"2023-05-03 22:15:00","updated_at":"2023-05-09 20:47:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2182.json","name":"https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2182.json","refsource":"CONFIRM","tags":[],"title":"2023/CVE-2023-2182.json · master · GitLab.org / cves · GitLab","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://gitlab.com/gitlab-org/gitlab/-/issues/403012","name":"https://gitlab.com/gitlab-org/gitlab/-/issues/403012","refsource":"MISC","tags":[],"title":"Admin users are demoted when OIDC authentication is enabled (#403012) · Issues · GitLab.org / GitLab · GitLab","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-2182","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2182","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"This vulnerability was reported to us by a customer","lang":""}],"nvd_cpes":[{"cve_year":"2023","cve_id":"2182","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"gitlab","cpe5":"gitlab","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"enterprise","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"2182","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"gitlab","cpe5":"gitlab","cpe6":"15.11.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"enterprise","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-2182","qid":"379220","title":"GitLab Multiple Security Vulnerabilities (gitlab- 15.11.1, 15.10.5, and 15.9.6)"},{"cve":"CVE-2023-2182","qid":"691159","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for gitlab (4ffcccae-e924-11ed-9c88-001b217b3468)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2023-2182","ASSIGNER":"cve@gitlab.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"GitLab","product":{"product_data":[{"product_name":"GitLab","version":{"version_data":[{"version_value":">=15.10, <15.10.5"},{"version_value":">=15.11, <15.11.1"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Improper access control in GitLab"}]}]},"references":{"reference_data":[{"name":"https://gitlab.com/gitlab-org/gitlab/-/issues/403012","url":"https://gitlab.com/gitlab-org/gitlab/-/issues/403012","refsource":"MISC"},{"name":"https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2182.json","url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2182.json","refsource":"CONFIRM"}]},"description":{"description_data":[{"lang":"eng","value":"An issue has been discovered in GitLab EE affecting all versions starting from 15.10 before 15.10.5, all versions starting from 15.11 before 15.11.1. Under certain conditions when OpenID Connect is enabled on an instance, it may allow users who are marked as 'external' to become 'regular' users thus leading to privilege escalation for those users."}]},"impact":{"cvss":{"vectorString":"AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N","attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","version":"3.1","baseScore":6.8,"baseSeverity":"MEDIUM"}},"credit":[{"lang":"eng","value":"This vulnerability was reported to us by a customer"}]},"nvd":{"publishedDate":"2023-05-03 22:15:00","lastModifiedDate":"2023-05-09 20:47:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:gitlab:gitlab:15.11.0:*:*:*:enterprise:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"15.10.0","versionEndExcluding":"15.10.5","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}