Open Nav
Sign Up

Critical GitLab Zero-Click Account Takeover Vulnerability Exposed

Bar Refael

January 25, 2024

A critical security vulnerability has been identified in over 5,300 internet-facing GitLab instances, susceptible to zero-click account takeover attacks. The flaw, tracked as CVE-2023-7028, enables attackers to redirect password reset emails to their own email addresses, consequently allowing unauthorized password changes and account takeovers. Notably, the vulnerability does not affect accounts with two-factor authentication (2FA) enabled.

Vulnerability Summary:

  • Affected Software: GitLab Community and Enterprise Editions
  • Vulnerability ID: CVE-2023-7028
  • Type of Vulnerability: Zero-Click Account Takeover
  • Exploitation Risk: Critical (CVSS score: 10.0)

Impacted Versions:

  • GitLab Community and Enterprise Edition versions prior to the following fixed versions are at risk:
    • 16.1.5
    • 16.2.8
    • 16.3.6
    • 16.4.4
    • 16.5.6
    • 16.6.4
    • 16.7.2

Remediation Efforts:

  • GitLab has issued patches for affected versions as of January 11, 2024.
  • Despite the availability of security updates, ShadowServer reports a significant number of unpatched and exposed instances.

Geographical Impact:

  • The United States, Germany, Russia, and China are among the countries with the highest counts of vulnerable servers.

Potential Consequences:

  • Unsecured servers may lead to supply chain attacks, code leaks, API key exposures, and further malicious actions.

Recommendations for Administrators:

  • Urgently apply the provided GitLab security updates.
  • Review GitLab’s incident response guide and audit logs for signs of compromise.
  • If a compromise is detected, immediately rotate credentials, API tokens, and certificates.
  • Enable 2FA on all GitLab accounts.
  • Inspect the development environment for unauthorized alterations.

Proactive Measures:

  • Admins should not delay action even in the absence of confirmed active exploitation.
  • Regularly scheduled security assessments and updates should be conducted as a preventive measure.

OP Innovate Advisory:

  • Clients using GitLab should verify their installations against the affected versions and implement the recommended security practices without delay. OP Innovate is poised to assist with any inquiries or support needed in navigating this critical security issue.

Stay Safe and Informed,

OP Innovate.

Resources highlights

MongoDB Zlib Protocol Vulnerability: CVE-2025-14847

MongoDB has issued an urgent security advisory warning administrators to patch a high-severity vulnerability affecting MongoDB Server deployments. The vulnerability, tracked as CVE-2025-14847, stems from…

Read more >

CVE-2025-14847

Critical n8n Workflow Automation RCE: CVE-2025-68613

A critical remote code execution vulnerability has been disclosed in the n8n workflow automation platform that could allow attackers to execute arbitrary code on affected…

Read more >

CVE-2025-68613

WatchGuard Firebox RCE Actively Exploited in the Wild: CVE-2025-14733

WatchGuard has disclosed a critical remote code execution (RCE) vulnerability affecting Firebox firewall appliances running the Fireware operating system. The vulnerability, tracked as CVE-2025-14733, is…

Read more >

CVE-2025-14733

SonicWall SMA 1000 Privilege Escalation: CVE-2025-40602

Threat actors are actively exploiting a privilege escalation vulnerability affecting SonicWall Secure Mobile Access (SMA) 1000 series appliances. The vulnerability, tracked as CVE-2025-40602, stems from…

Read more >

CVE-2025-40602

Active Exploitation of Fortinet FortiCloud SSO Authentication Bypass (CVE-2025-59718 & CVE-2025-59719)

Threat actors are actively exploiting two critical authentication bypass vulnerabilities in Fortinet products by abusing FortiCloud SSO functionality. The flaws, tracked as CVE-2025-59718 & CVE-2025-59719…

Read more >

CVE-2025-59718 & CVE-2025-59719

Apple WebKit Zero-Day Exploited in Targeted Attacks (CVE-2025-14174)

Apple has released emergency security updates to address CVE-2025-14174, a zero-day vulnerability in WebKit that has been actively exploited in the wild as part of…

Read more >

CVE-2025-14174
Under Cyber Attack?

Fill out the form and we will contact you immediately.