Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-t8nq-hx26-kfc7
SummaryAn issue has been discovered in GitLab CE/EE affecting all versions starting from 10.5 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. Unauthorized external users could perform Server Side Requests via the CI Lint API
Aliases
0
alias CVE-2021-39935
Fixed_packages
0
url pkg:alpm/archlinux/gitlab@14.5.2-1
purl pkg:alpm/archlinux/gitlab@14.5.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@14.5.2-1
1
url pkg:deb/debian/gitlab@15.10.8%2Bds1-2?distro=sid
purl pkg:deb/debian/gitlab@15.10.8%2Bds1-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gitlab@15.10.8%252Bds1-2%3Fdistro=sid
2
url pkg:deb/debian/gitlab@17.6.5-19?distro=sid
purl pkg:deb/debian/gitlab@17.6.5-19?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gitlab@17.6.5-19%3Fdistro=sid
Affected_packages
0
url pkg:alpm/archlinux/gitlab@14.5.0-1
purl pkg:alpm/archlinux/gitlab@14.5.0-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17gb-vdxv-fqc4
1
vulnerability VCID-1f4t-7du8-q3ex
2
vulnerability VCID-5t99-3qbr-sfdj
3
vulnerability VCID-6ns1-mx95-5ffe
4
vulnerability VCID-71j9-ra1c-6uhm
5
vulnerability VCID-989x-8yn6-eqc8
6
vulnerability VCID-99uy-2jrp-u7cx
7
vulnerability VCID-9mm8-knzf-a3gb
8
vulnerability VCID-9wuq-32s1-nydy
9
vulnerability VCID-buuk-gsy3-w7bp
10
vulnerability VCID-gvwq-zqmf-ruak
11
vulnerability VCID-h8td-pdxx-y7en
12
vulnerability VCID-j8nr-cgq2-ubf9
13
vulnerability VCID-m6c7-dfbf-r7gr
14
vulnerability VCID-n2jn-c1k6-67b9
15
vulnerability VCID-t8nq-hx26-kfc7
16
vulnerability VCID-uzq6-eukx-8yhv
17
vulnerability VCID-vfvr-mjgk-4qce
18
vulnerability VCID-w1jg-8rdt-3ufv
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@14.5.0-1
References
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39935
reference_id
reference_type
scores
0
value 0.41434
scoring_system epss
scoring_elements 0.97378
published_at 2026-04-01T12:55:00Z
1
value 0.41434
scoring_system epss
scoring_elements 0.97389
published_at 2026-04-04T12:55:00Z
2
value 0.41434
scoring_system epss
scoring_elements 0.97391
published_at 2026-04-07T12:55:00Z
3
value 0.41434
scoring_system epss
scoring_elements 0.97397
published_at 2026-04-08T12:55:00Z
4
value 0.41434
scoring_system epss
scoring_elements 0.97398
published_at 2026-04-09T12:55:00Z
5
value 0.41434
scoring_system epss
scoring_elements 0.974
published_at 2026-04-11T12:55:00Z
6
value 0.41434
scoring_system epss
scoring_elements 0.97401
published_at 2026-04-12T12:55:00Z
7
value 0.41434
scoring_system epss
scoring_elements 0.97402
published_at 2026-04-13T12:55:00Z
8
value 0.41434
scoring_system epss
scoring_elements 0.9741
published_at 2026-04-16T12:55:00Z
9
value 0.41434
scoring_system epss
scoring_elements 0.97413
published_at 2026-04-18T12:55:00Z
10
value 0.41434
scoring_system epss
scoring_elements 0.97384
published_at 2026-04-02T12:55:00Z
11
value 0.58412
scoring_system epss
scoring_elements 0.98206
published_at 2026-04-21T12:55:00Z
12
value 0.58412
scoring_system epss
scoring_elements 0.98208
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39935
1
reference_url https://hackerone.com/reports/1236965
reference_id 1236965
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-03T15:23:46Z/
url https://hackerone.com/reports/1236965
2
reference_url https://gitlab.com/gitlab-org/gitlab/-/issues/346187
reference_id 346187
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-03T15:23:46Z/
url https://gitlab.com/gitlab-org/gitlab/-/issues/346187
3
reference_url https://security.archlinux.org/ASA-202112-10
reference_id ASA-202112-10
reference_type
scores
url https://security.archlinux.org/ASA-202112-10
4
reference_url https://security.archlinux.org/AVG-2603
reference_id AVG-2603
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2603
5
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39935.json
reference_id CVE-2021-39935.json
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-03T15:23:46Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39935.json
Weaknesses
Exploits
0
date_added 2026-02-03
description GitLab Community and Enterprise Editions contain a server-side request forgery vulnerability which could allow unauthorized external users to perform Server Side Requests via the CI Lint API.
required_action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
due_date 2026-02-24
notes https://about.gitlab.com/releases/2021/12/06/security-release-gitlab-14-5-2-released/ ; https://nvd.nist.gov/vuln/detail/CVE-2021-39935
known_ransomware_campaign_use false
source_date_published null
exploit_type null
platform null
source_date_updated null
data_source KEV
source_url null
Severity_range_score6.8 - 8.9
Exploitability2.0
Weighted_severity8.0
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-t8nq-hx26-kfc7