CVSS 3.1 Score 5.7 of 10 (medium)


Published Dec 15, 2023
Updated: Jan 2, 2024


CVE-2023-6051 is a vulnerability that affects GitLab CE/EE versions before 16.4.4, versions starting from 15.5 before 16.5.4, and versions starting from 16.6 before 16.6.2. This vulnerability can compromise file integrity when source code or installation packages are pulled from a specific tag. The base severity of this vulnerability is rated as MEDIUM, with a base score of 5.7 according to the CVSS scoring system. It requires low privileges and user interaction to exploit, and the attack vector is through the network. The potential danger it poses to an organization is high integrity impact, meaning that an attacker can modify files in the codebase undetected, potentially leading to unauthorized changes or malicious code execution within the organization's systems. To remediate this vulnerability, organizations should update their GitLab CE/EE installations to versions 16.4.4, 16.5.4, or 16.6.2 or later to mitigate the risk of file integrity compromise.

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-6051 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options