EUVD-2024-55303

| CVE-2024-9183 HIGH
2025-12-05 [email protected]
7.7
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
None

Lifecycle Timeline

4
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
Analysis Generated
Mar 15, 2026 - 17:08 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 17:08 euvd
EUVD-2024-55303
CVE Published
Dec 05, 2025 - 17:16 nvd
HIGH 7.7

Description

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.4 prior to 18.4.5, 18.5 prior to 18.5.3, and 18.6 prior to 18.6.1 that could have allowed an authenticated user to obtain credentials from higher-privileged users and perform actions in their context under specific conditions.

Analysis

A security vulnerability in GitLab CE/EE affecting all (CVSS 7.7). High severity vulnerability requiring prompt remediation.

Technical Context

Vulnerability type not specified by vendor. CVSS 7.7 indicates high severity. Affects GitLab CE/EE affecting all.

Affected Products

['GitLab CE/EE affecting all']

Remediation

Monitor vendor channels for patch availability.

Priority Score

39
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +38
POC: 0

Vendor Status

Debian

gitlab
Release Status Fixed Version Urgency
sid fixed 17.6.5-19 -
(unstable) not-affected - -

Share

EUVD-2024-55303 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy