GitLab Fixes Critical Severity Flaw That Allows Attackers To Take Over Accounts

April 4, 2022

GitLab has fixed a critical severity flaw tracked as CVE-2022-1162 affecting both GitLab Community Edition (CE) and Enterprise Edition (EE).

GitLab said it reset the passwords of a limited number of GitLab.com users as part of the CVE 2022-1162 mitigation effort.

The vulnerability allows remote attackers to take over user accounts with strongly encrypted passwords. The flaw surfaced from static passwords accidentally set during OmniAuth-based registration in GitLab CE/EE.

GitLab recommended users to upgrade to the latest versions (14.9.2, 14.8.5, or 14.7.7) to limit attacks from the exploited vulnerability.

“We executed a reset of GitLab.com passwords for a selected set of users starting at 15:38 UTC. Our investigation shows no indication that users or accounts have been compromised, but we’re taking precautionary measures for our users’ security,” the GitLab team said.

GitLab explained that no user accounts have been compromised, and after potentially affected user accounts are identified, administrators are advised to reset user passwords.

For more information, read the original story in BleepingComputer.

Top Stories

Related Articles

January 16, 2026 A newly uncovered malware framework suggests attackers are quietly preparing for a much deeper push into Linux more...

January 16, 2026 A massive trove of personal data belonging to thousands of U.S. immigration agents has reportedly been leaked more...

December 30, 2025 A fast-moving cyberattack has compromised more than 59,000 internet-facing Next.js servers in less than two days after more...

December 29, 2025 The U.S. National Institute of Standards and Technology (NIST) has warned that several of its Internet Time more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn