Impact
This vulnerability, identified as CWE‑93, occurs because GitLab’s import functionality does not properly neutralize CRLF sequences. When an authenticated user supplies crafted input, the system can perform unintended internal HTTP requests through configured proxy environments. The result is that the application may reach internal services or endpoints that the user is not authorized to access, potentially exposing sensitive internal data or allowing bypass of access controls.
Affected Systems
Affected products are GitLab Community and Enterprise Editions. All releases from 8.11 up to 18.7.5, from 18.8.0 up to 18.8.5, and from 18.9.0 up to 18.9.1 would be vulnerable. The recommendation is to upgrade to GitLab 18.7.6, 18.8.6, 18.9.2 or later. The CPE string shows the product is GitLab:gitlab.
Risk and Exploitability
The CVSS v3 base score is 5.0, indicating a medium severity. The EPSS score is below 1%, implying a low probability of exploitation in the wild. This vulnerability is not indexed in CISA’s KEV catalog. Attack execution requires an authenticated user with access to the import feature; no publicly available remote exploitation path is documented. Remediation by upgrading mitigates the risk completely.
OpenCVE Enrichment