⚠ Actively exploited
Added to CISA KEV on 2026-02-18. Federal agencies required to patch by 2026-03-11. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable..
CVE-2021-22175 — Server-Side Request Forgery in Gitlab
Severity
9.8CRITICALNVD
VulnCheck6.8
EPSS
76.6%
top 1.05%
CISA KEV
KEV
Added 2026-02-18
Due 2026-03-11
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJun 11
KEV addedFeb 18
KEV dueMar 11
CISA Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Description
When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is disabled
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages4 packages
🔴Vulnerability Details
3GHSA▶
GHSA-4gm2-v7j4-74p8: When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab affecting all versions starting↗2022-05-24
OSV▶
CVE-2021-22175: When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab affecting all versions starting↗2021-06-11
💥Exploits & PoCs
2Nuclei▶
Gitlab CE/EE 10.5 - Server-Side Request Forgery
Nuclei▶
GitLab CI Lint API - Server-Side Request Forgery
📋Vendor Advisories
3GitLab▶
CVE-2021-22175: When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab affecting all versions starting↗2021-06-11
Debian▶
CVE-2021-22175: gitlab - When requests to the internal network for webhooks are enabled, a server-side re...↗2021