CVE-2023-2825

CRITICAL NUCLEI

GitLab Authenticated File Read

Title source: metasploit

Description

An issue has been discovered in GitLab CE/EE affecting only version 16.0.0. An unauthenticated malicious user can use a path traversal vulnerability to read arbitrary files on the server when an attachment exists in a public project nested within at least five groups.

Exploits (8)

nomisec WORKING POC 140 stars
by Occamsec · poc
https://github.com/Occamsec/CVE-2023-2825
nomisec WRITEUP
by alej6 · poc
https://github.com/alej6/MassCyberCenter-Mentorship-Project-
nomisec WORKING POC
by cc3305 · poc
https://github.com/cc3305/CVE-2023-2825
nomisec WORKING POC
by caopengyan · poc
https://github.com/caopengyan/CVE-2023-2825
nomisec WORKING POC
by Rubikcuv5 · poc
https://github.com/Rubikcuv5/CVE-2023-2825
nomisec WORKING POC
by Tornad0007 · poc
https://github.com/Tornad0007/CVE-2023-2825-Gitlab
metasploit WORKING POC
by h00die, pwnie, Vitellozzo · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/gather/gitlab_authenticated_subgroups_file_read.rb

Nuclei Templates (1)

GitLab 16.0.0 - Path Traversal
HIGHVERIFIEDby DhiyaneshDk,rootxharsh,iamnoooob,pdresearch
Shodan: title:"Gitlab" || cpe:"cpe:2.3:a:gitlab:gitlab" || http.title:"gitlab"
FOFA: title="gitlab"

Scores

CVSS v3 10.0
EPSS 0.9218
EPSS Percentile 99.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N

Details

CWE
CWE-22
Status published
Products (1)
gitlab/gitlab 16.0.0 (2 CPE variants)
Published May 26, 2023
Tracked Since Feb 18, 2026