Home » Database

AVID-2026-R0936

Description

Vulnerability CVE-2022-1423

Details

Improper access control in the CI/CD cache mechanism in GitLab CE/EE affecting all versions starting from 1.0.2 before 14.8.6, all versions from 14.9.0 before 14.9.4, and all versions from 14.10.0 before 14.10.1 allows a malicious actor with Developer privileges to perform cache poisoning leading to arbitrary code execution in protected branches

Reason for inclusion in AVID: CVE-2022-1423 describes improper access control in GitLab CI/CD cache, enabling a developer to poison caches and achieve arbitrary code execution in protected branches. GitLab CI/CD is a widely used component in AI software pipelines for building, testing, packaging, and deploying ML systems, making this a software supply chain vulnerability affecting AI workflows. It is a security/vulnerability issue with explicit evidence and references in the CVE entry and associated sources.

References

Affected or Relevant Artifacts

  • Developer: GitLab
  • Deployer: GitLab
  • Artifact Details:
TypeName
SystemGitLab

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.1
Vector StringCVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N
Base Score7.1
Base Severity🔴 High
Attack VectorNETWORK
Attack Complexity🔴 High
Privileges Required🟢 Low
User InteractionNONE
ScopeCHANGED
Confidentiality Impact🔴 High
Integrity Impact🟢 Low
Availability ImpactNONE

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2022-05-19
  • Version: 0.3.3
  • AVID Entry