CVE-2021-4191
An issue has been discovered in GitLab CE/EE affecting versions 13.0 to 14.6.5, 14.7 to 14.7.4, and 14.8 to 14.8.2. Private GitLab instances with...
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- December 30, 2021
- Published Date
- March 28, 2022
- Last Updated
- August 03, 2024
- Vendor
- GitLab
- Product
- GitLab
- Description
- An issue has been discovered in GitLab CE/EE affecting versions 13.0 to 14.6.5, 14.7 to 14.7.4, and 14.8 to 14.8.2. Private GitLab instances with restricted sign-ups may be vulnerable to user enumeration to unauthenticated users through the GraphQL API.
CVSS Scores
CVSS v3.1
5.3 - MEDIUM
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
EPSS Score
- Score
- 93.66% (Percentile: 99.83%) as of 2025-04-29
Exploit Status
- Exploited in the Wild
- Yes (added 2025-04-28 00:00:00 UTC) Source
References
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
The Shadowserver (via CIRCL) | 2025-04-28 00:00:00 UTC |
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Nuclei | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-4191.yaml | 2025-04-26 00:00:00 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
K3ysTr0K3R/CVE-2021-4191-EXPLOIT
Type: github • Created: 2023-07-22 21:06:51 UTC • Stars: 5
A PoC exploit for CVE-2021-4191 - GitLab User Enumeration.
Adelittle/CVE-2021-4191_Exploits
Type: github • Created: 2023-06-05 04:08:45 UTC • Stars: 0