CVE-2023-2825
CRITICAL NUCLEIGitLab Authenticated File Read
Title source: metasploitDescription
An issue has been discovered in GitLab CE/EE affecting only version 16.0.0. An unauthenticated malicious user can use a path traversal vulnerability to read arbitrary files on the server when an attachment exists in a public project nested within at least five groups.
Exploits (8)
metasploit
WORKING POC
by h00die, pwnie, Vitellozzo · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/gather/gitlab_authenticated_subgroups_file_read.rb
Nuclei Templates (1)
GitLab 16.0.0 - Path Traversal
HIGHVERIFIEDby DhiyaneshDk,rootxharsh,iamnoooob,pdresearch
Shodan:
title:"Gitlab" || cpe:"cpe:2.3:a:gitlab:gitlab" || http.title:"gitlab"
FOFA:
title="gitlab"
Scores
CVSS v3
10.0
EPSS
0.9218
EPSS Percentile
99.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
Details
CWE
CWE-22
Status
published
Products (1)
gitlab/gitlab
16.0.0 (2 CPE variants)
Published
May 26, 2023
Tracked Since
Feb 18, 2026