⚠ Actively exploited
Added to CISA KEV on 2024-05-01. Federal agencies required to patch by 2024-05-22. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable..
CVE-2023-7028 — Weak Password Recovery Mechanism for Forgotten Password in Gitlab
Severity
9.8CRITICALNVD
VulnCheck10.0
EPSS
93.5%
top 0.17%
CISA KEV
KEV
Added 2024-05-01
Due 2024-05-22
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedJan 12
KEV addedMay 1
KEV dueMay 22
Latest updateFeb 26
CISA Required Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Description
An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages5 packages
🔴Vulnerability Details
3💥Exploits & PoCs
3🔍Detection Rules
1📋Vendor Advisories
3GitLab▶
CVE-2023-7028: An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior↗2024-01-12
Debian▶
CVE-2023-7028: gitlab - An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 pr...↗2023
🕵️Threat Intelligence
11Greynoiseio▶
GreyNoise Detects Active Exploitation of CVEs Mentioned in Black Basta’s Leaked Chat Logs↗2025-02-26