Impact
GitLab versions 16.8 through 18.4.9 expose a missing authorization check that permits an attacker with access to the web interface or API to modify merge request approval rules. This flaw compromises the integrity of repo governance by allowing approval rules to be altered without proper permission, potentially enabling unauthorized merges or bypassing required reviews.
Affected Systems
The vulnerability affects GitLab Community and Enterprise editions, all versions from 16.8 up to but not including 18.5.0.
Risk and Exploitability
The flaw carries a CVSS v3.1 score of 3.1, indicating moderate impact. EPSS indicates a very low exploitation probability (<1%) and the issue is not in the CISA KEV catalog. Exploitation likely requires authenticated access via the web UI or API, but the missing authorization gate allows any user with basic access to create or edit approval rules. The risk is confined to authorization bypass rather than remote code execution.
OpenCVE Enrichment