Impact
GitLab versions prior to 18.8.4 contain a flaw that improperly validates unsafe equivalence in user input, allowing an authenticated developer to conceal specially crafted file changes from the WebUI. This weakness, identified as CWE‑1289, can enable developers to hide modifications to repository contents, impacting the integrity of displayed code and potentially allowing the persistence of unauthorized changes.
Affected Systems
Both GitLab Community Edition and Enterprise Edition are impacted, specifically all releases from 18.8 up to but not including 18.8.4. Users running any of these versions should examine their installations to determine whether they are within this range.
Risk and Exploitability
The overall CVSS score of 4.6 places the vulnerability in the moderate range, and the EPSS score of less than 1% indicates a low likelihood of widespread exploitation. The vulnerability is not in the CISA KEV catalog. The attack vector requires an insider credential with developer-level access; the attacker must be authenticated to the GitLab instance and possess permissions to commit changes. Given the limited scope, the risk is primarily to the integrity of code visible through the WebUI.
OpenCVE Enrichment