CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
Lifecycle Timeline
2DescriptionNVD
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 11.2 before 18.9.6, 18.10 before 18.10.4, and 18.11 before 18.11.1 that under certain conditions could have allowed an authenticated user with project owner permissions to bypass group fork prevention settings due to improper authorization checks.
AnalysisAI
Authenticated project owners in GitLab CE/EE versions 11.2-18.9.5, 18.10-18.10.3, and 18.11-18.11.0 can bypass group fork prevention settings due to improper authorization checks, allowing them to create forks when they should be restricted. The vulnerability requires authentication and high-privilege access (project owner role), resulting in low severity (CVSS 2.7). Publicly available exploit code exists and patch versions have been released by the vendor.
Technical ContextAI
The vulnerability stems from CWE-863 (Incorrect Authorization) in GitLab's fork creation logic. Group administrators can configure fork prevention policies to restrict forking within a group, but the authorization checks fail to properly validate these group-level settings when a project owner initiates a fork request. The affected code likely lacks a call to verify group fork prevention rules before allowing the fork operation, permitting authenticated high-privileged users to circumvent administrative controls. This affects GitLab Community Edition (CE) and Enterprise Edition (EE) across a wide version range, from the introduction of improved fork controls in 11.2 through recent releases.
RemediationAI
Upgrade GitLab to a patched version immediately: apply GitLab 18.9.6 or later for versions before 18.10, upgrade to GitLab 18.10.4 or later for the 18.10 series, or patch to GitLab 18.11.1 or later for the 18.11 series. Until patching is possible, restrict project owner role assignments to trusted users who will not intentionally bypass fork prevention policies, and implement network-level monitoring to audit fork creation requests from high-privilege accounts. Additionally, review group fork prevention policy settings in your GitLab instances to confirm they are applied to all projects requiring fork restrictions, though this does not remediate the authorization bypass itself. Consult the GitLab work item https://gitlab.com/gitlab-org/gitlab/-/work_items/567781 for implementation details and any additional compensating controls provided by GitLab.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-209556
GHSA-6gww-qgc8-r365