An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.4 before 15.5.7, all versions starting from 15.6 before 15.6.4, all versions starting from 15.7 before 15.7.2. Due to the improper filtering of query parameters in the wiki changes page, an attacker can execute arbitrary JavaScript on the self-hosted instances running without strict CSP.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: GitLab
Published:
Updated: 2024-08-03T01:14:02.089Z
Reserved: 2022-10-17T00:00:00
Link: CVE-2022-3573

No data.

Status : Modified
Published: 2023-01-12T04:15:08.803
Modified: 2024-11-21T07:19:47.797
Link: CVE-2022-3573

No data.