An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.5 prior to 16.9.7, starting from 16.10 prior to 16.10.5, and starting from 16.11 prior to 16.11.2. GitLab was vulnerable to Server Side Request Forgery when an attacker uses a malicious URL in the markdown  image value when importing a GitHub repository.
                
            References
                    | Link | Resource | 
|---|---|
| https://gitlab.com/gitlab-org/gitlab/-/issues/432276 | Exploit Issue Tracking | 
| https://hackerone.com/reports/2249268 | Permissions Required | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    05 Aug 2025, 20:55
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | Gitlab Gitlab gitlab | |
| CPE | cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:* cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:* | |
| References | () https://gitlab.com/gitlab-org/gitlab/-/issues/432276 - Exploit, Issue Tracking | |
| References | () https://hackerone.com/reports/2249268 - Permissions Required | 
18 Feb 2025, 19:15
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
31 Jan 2025, 00:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-01-31 00:15
Updated : 2025-08-05 20:55
NVD link : CVE-2023-6195
Mitre link : CVE-2023-6195
CVE.ORG link : CVE-2023-6195
JSON object : View
Products Affected
                gitlab
- gitlab
CWE
                
                    
                        
                        CWE-918
                        
            Server-Side Request Forgery (SSRF)
