Skip to content
Techzine Global
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Global
  • Techzine Netherlands
  • Techzine Belgium
  • Techzine TV
  • ICTMagazine Netherlands
  • ICTMagazine Belgium
Techzine » News » Security » GitLab accounts vulnerable to takeover, patch available
2 min Security

GitLab accounts vulnerable to takeover, patch available

Erik van KlinkenJanuary 12, 2024 3:26 pmJanuary 12, 2024 3:26 pm
GitLab accounts vulnerable to takeover, patch available

GitLab is warning users about a critical vulnerability in GitLab Community Edition (CE) and Enterprise Edition (EE). The vulnerability in question, CVE-2023-7028, allows hackers to take over accounts. Patches have already been released.

According to GitLab, the CVE-2023-7028 vulnerability makes it possible to easily take over accounts. Namely, this can be done by having emails to reset passwords delivered to an unverified email address. Those without 2FA enabled could lose access to their own accounts without the new patch.

When CE and Enterprise end users do use 2FA to log into their accounts, the vulnerability only allows hackers to reset passwords. The accounts cannot then be taken over as the external authentication method is required after a password change request.

Problem with email authentication

The vulnerability was itself introduced by GitLab with the release of the GitLab CE and Enterprise editions v 16.1.0. This included the ability to reset a password via a second email address. The bug in question ended up in the email verification process.

No active exploits yet

The bug has been active since May 2023, but may have remained unknown outside of GitLab itself. Active exploits of the vulnerability are therefore not known, but GitLab urges users who host the platform themselves to check their own log files carefully.

The development platform has already patched the bug and released updated versions 16.7.2, 16.6.4 and 16.5.6 for both editions. End users should implement the updates as soon as possible, GitLab indicates.

Also read: GitLab 16 unveiled

Tags:

account takeover / CVE-2023-7028 / GitLab / vulnerability

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Stay tuned, subscribe!

Nieuwsbrieven*

Related

Veeam closes serious vulnerability in Backup & Replication, patch required

‘Ni8mare’ vulnerability affects n8n platform with a score of 10.0

MongoBleed threatens databases, but detection tool is available

Attackers exploit five-year-old Fortinet vulnerability

Editor picks

RAG ‘2.0’: the Instructed Retriever links AI agents to the right data

Agentic AI relies on a multitude of technological innovations. One of...

‘Ni8mare’ vulnerability affects n8n platform with a score of 10.0

Security researchers at Cyera have discovered a critical vulnerabilit...

Is Grok enterprise ready? xAI thinks so

X factor missing

Arm and Nvidia are on the prowl for physical AI’s ‘ChatGPT moment’

Is robotics about to experience an AI breakthrough?

Techzine.tv

Atlassian CTO on realistic AI: Rovo, data privacy & adoption

Atlassian CTO on realistic AI: Rovo, data privacy & adoption

How Capgemini transformed HR for 400,000 employees globally

How Capgemini transformed HR for 400,000 employees globally

Why 90% of Salesforce Agentforce deployments start with service

Why 90% of Salesforce Agentforce deployments start with service

SAP's AI migration tools from ECC to S/4HANA: faster and cheaper ERP transitions

SAP's AI migration tools from ECC to S/4HANA: faster and cheaper ERP transitions

Read more on Security

Trend Micro closes critical vulnerabilities in Apex Central

Trend Micro closes critical vulnerabilities in Apex Central

Trend Micro has fixed three critical vulnerabilities in Apex Central. The most serious, with a CVSS score of ...

Berry Zwets 14 hours ago
Why did so many security vendors abandon MITRE’s stresstest?
Top story

Why did so many security vendors abandon MITRE’s stresstest?

This year, MITRE made headlines primarily because its leading vulnerability database was in danger of being d...

Erik van Klinken December 12, 2025
Sophos CEO sees “cybersecurity poverty line”: what to do about it?
Top story

Sophos CEO sees “cybersecurity poverty line”: what to do about it?

We sit down with Sophos CEO Joe Levy during Pax8 Beyond to discuss, among other things, the progress of the S...

Sander Almekinders December 11, 2025
After investment round, Cyera expands its vision on AI security

After investment round, Cyera expands its vision on AI security

Cyera raised $400 million in a new investment round. This brings the company's valuation to approximately $9 ...

Mels Dees 17 hours ago

Expert Talks

Cybersecurity in 2026 demands managing human behavior and agentic AI

Cybersecurity in 2026 demands managing human behavior and agentic AI

Most organizations today have more security technology at their dispo...

Digital sovereignty: from buzzword to business imperative

Digital sovereignty: from buzzword to business imperative

Digital sovereignty has outgrown its niche as an IT concern and is no...

Why specialized LLMs are the future of generative AI

ChatGPT and the other GenAI chatbots that have taken the tech world b...

The year of the AI agents: why 2026 is about value, not technology

Microsoft has declared 2026 to be the year of the agent. This is not ...

Tech calendar

Appdevcon

March 10, 2026 Amsterdam

Webdevcon

March 10, 2026 Amsterdam

Dutch PHP Conference

March 10, 2026 Amsterdam

De IT Afdeling van de toekomst

March 31, 2026 Naaldwijk

GITEX ASIA 2026

April 8, 2026 Singapore

SAS Innovate 2026

April 27, 2026 Grapevine

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2026 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement