---
licence_title: Creative Commons Attribution 4.0 International (CC-BY 4.0)
licence_link: https://creativecommons.org/licenses/by/4.0/
licence_restrictions: https://cert.europa.eu/legal-notice
licence_author: CERT-EU, The Cybersecurity Service for the European Union institutions, bodies, offices and agencies
title: 'Critical Remote Code Execution Vulnerability in GitLab'
version: '1.0'
number: '2022-048'
original_date: 'June 30, 2022'
date: 'July 4, 2022'
---
_History:_
* _04/07/2022 --- v1.0 -- Initial publication_
# Summary
On June 30, 2022, GitLab released new software versions that fix several vulnerabilities [1], one of which is a critical remote command execution vulnerability identified `CVE-2022-2185`, with a CVSS score of 9.9 out of 10 [2].
It is highly recommended to upgrade GitLab servers to the latest available version.
# Technical Details
The vulnerability exists in the `Project Imports` feature where an **authorised** user could import a maliciously crafted project leading to remote code execution.
# Affected Products
The following version of GitLab Community Edition (CE) and Enterprise Edition (EE) are affected:
- 14.0 prior to 14.10.5
- 15.0 prior to 15.0.4
- 15.1 prior to 15.1.1
## Recommendations
CERT-EU strongly recommends upgrading all GitLab servers to the latest version as soon as possible.
# References
[1]
[2]