CVE-2024-1525
Authentication Bypass Using an Alternate Path or Channel in GitLab
CVSS Score
5.3
EPSS Score
0.0%
EPSS Percentile
1th
An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.1 before 16.7.6, all versions starting from 16.8 before 16.8.3, all versions starting from 16.9 before 16.9.1. Under some specialized conditions, an LDAP user may be able to reset their password using their verified secondary email address and sign-in using direct authentication with the reset password, bypassing LDAP.
| CWE | CWE-288 |
| Vendor | gitlab |
| Product | gitlab |
| Ecosystems | |
| Industries | Technology |
| Published | Feb 21, 2024 |
| Last Updated | Apr 16, 2026 |
Stay Ahead of the Next One
Get instant alerts for gitlab gitlab
Be the first to know when new medium vulnerabilities affecting gitlab gitlab are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
Affected Versions
GitLab / GitLab
16.1 < 16.7.6 16.8 < 16.8.3 16.9 < 16.9.1
References
Credits
This vulnerability was discovered internally by a GitLab team member, [Drew Blessing](https://gitlab.com/dblessing)