First published: Wed Jul 07 2021(Updated: )
A cross-site request forgery vulnerability in the GraphQL API in GitLab since version 13.12 and before versions 13.12.6 and 14.0.2 allowed an attacker to call mutations as the victim
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.12.0<13.12.6 | |
GitLab | >=14.0.0<14.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22224 is classified as a medium-severity vulnerability.
To fix CVE-2021-22224, upgrade GitLab to version 13.12.6 or 14.0.2 or later.
CVE-2021-22224 allows attackers to perform cross-site request forgery attacks by executing mutations as the victim.
CVE-2021-22224 affects GitLab versions 13.12.0 to 13.12.5 and 14.0.0 to 14.0.1.
Any user of the affected versions of GitLab who interacts with the GraphQL API can be at risk from CVE-2021-22224.