A recent discovery reveals that GitLab CE/EE (Community Edition/Enterprise Edition) has a cross-site scripting (XSS) vulnerability, identified as CVE-2022-3572, that affects a wide range of versions from 13.5 up to 15.3.5, 15.4 up to 15.4.4, and 15.5 up to 15.5.2. The vulnerability resides in the Jira Connect integration, and exploitation of this vulnerability could lead to a reflected XSS attack. This could potentially enable attackers to perform arbitrary actions as the victim.

15.5 to 15.5.2

Original references:
1. GitLab Security Advisory
2. CVE-2022-3572 NVD Listing

Exploit Details

The Jira Connect integration allows users to configure a connection between GitLab and their Jira instance. However, due to improper input validation, the integration could be exploited through a reflected XSS attack.

A malicious actor could exploit this vulnerability by crafting a specially designed URL, and then tricking a victim into clicking the URL or visiting a webpage containing the URL. Upon visiting the webpage, the victim's browser would execute the attacker's supplied JavaScript code. This could potentially lead to unintended actions being performed on behalf of the victim without their consent.

Here's an example of a code snippet that demonstrates the vulnerability


Please note that this code snippet is meant for demonstration purposes only and should not be used to exploit any systems or engage in any malicious activities.


To remedy this vulnerability, GitLab has released updates to patch the affected versions. Administrators should update their GitLab installations to the following versions as soon as possible:

15.5.2 or later

By applying the relevant updates, the improper input validation (and thus the vulnerability) would be fixed, mitigating the risk posed by the CVE-2022-3572 vulnerability.

For more details on patching your GitLab installation and keeping your environment secure, refer to the GitLab Update Guide.


CVE-2022-3572 is a notable security vulnerability that affects several versions of GitLab CE/EE. By exploiting this cross-site scripting issue, attackers could potentially execute arbitrary actions on behalf of unsuspecting victims. It is crucial for GitLab administrators to be aware of this issue and apply the necessary updates to secure their systems. Regularly updating and monitoring systems can help prevent the exploitation of vulnerabilities and protect against potential security threats.


Published on: 01/26/2023 21:15:00 UTC
Last modified on: 02/01/2023 17:17:00 UTC