{"url":"http://public2.vulnerablecode.io/api/packages/371200?format=json","purl":"pkg:alpm/archlinux/gitlab@13.10.1-1","type":"alpm","namespace":"archlinux","name":"gitlab","version":"13.10.1-1","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"13.10.3-1","latest_non_vulnerable_version":"15.2.1-1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/240498?format=json","vulnerability_id":"VCID-21su-ba8v-huay","summary":"An issue has been discovered in GitLab CE/EE affecting all previous versions. If the victim is an admin, it was possible to issue a CSRF in System hooks through the API.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22202","reference_id":"","reference_type":"","scores":[{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.35902","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.3623","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.3642","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36453","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36288","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36336","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36357","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36364","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36327","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36306","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36348","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36332","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36277","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36045","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36015","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.35928","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.35812","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.3588","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.359","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.35835","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22202"},{"reference_url":"https://security.archlinux.org/AVG-1770","reference_id":"AVG-1770","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1770"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371200?format=json","purl":"pkg:alpm/archlinux/gitlab@13.10.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@13.10.1-1"}],"aliases":["CVE-2021-22202"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-21su-ba8v-huay"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/240489?format=json","vulnerability_id":"VCID-2978-z7hp-tked","summary":"An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.4. It was possible to exploit a stored cross-site-scripting in merge request via a specifically crafted branch name.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22196","reference_id":"","reference_type":"","scores":[{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40712","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.4095","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41031","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41063","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40989","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41038","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41045","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41064","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41029","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41012","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41054","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41025","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40949","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40856","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40843","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40759","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40616","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40689","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40708","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40614","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40638","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22196"},{"reference_url":"https://security.archlinux.org/AVG-1770","reference_id":"AVG-1770","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1770"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371200?format=json","purl":"pkg:alpm/archlinux/gitlab@13.10.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@13.10.1-1"}],"aliases":["CVE-2021-22196"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2978-z7hp-tked"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/240492?format=json","vulnerability_id":"VCID-2tqx-h18v-kbcg","summary":"An issue has been discovered in GitLab CE/EE affecting all versions from 13.8 and above allowing an authenticated user to delete incident metric images of public projects.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22198","reference_id":"","reference_type":"","scores":[{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53414","published_at":"2026-05-14T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53244","published_at":"2026-04-01T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53268","published_at":"2026-04-02T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53294","published_at":"2026-04-04T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53262","published_at":"2026-04-07T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53314","published_at":"2026-04-08T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53309","published_at":"2026-04-09T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.5336","published_at":"2026-04-11T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53344","published_at":"2026-04-12T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53327","published_at":"2026-04-13T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53365","published_at":"2026-04-16T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.5337","published_at":"2026-04-18T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53351","published_at":"2026-04-21T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53323","published_at":"2026-04-24T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53335","published_at":"2026-04-26T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53298","published_at":"2026-04-29T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53256","published_at":"2026-05-05T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53306","published_at":"2026-05-07T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53359","published_at":"2026-05-09T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.5332","published_at":"2026-05-11T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53345","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22198"},{"reference_url":"https://security.archlinux.org/AVG-1770","reference_id":"AVG-1770","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1770"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371200?format=json","purl":"pkg:alpm/archlinux/gitlab@13.10.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@13.10.1-1"}],"aliases":["CVE-2021-22198"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2tqx-h18v-kbcg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/240497?format=json","vulnerability_id":"VCID-396g-fjpn-qucv","summary":"An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.9. A specially crafted import file could read files on the server.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22201","reference_id":"","reference_type":"","scores":[{"value":"0.0899","scoring_system":"epss","scoring_elements":"0.92693","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0899","scoring_system":"epss","scoring_elements":"0.92579","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0899","scoring_system":"epss","scoring_elements":"0.92584","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0899","scoring_system":"epss","scoring_elements":"0.92591","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0899","scoring_system":"epss","scoring_elements":"0.92592","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0899","scoring_system":"epss","scoring_elements":"0.92603","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0899","scoring_system":"epss","scoring_elements":"0.92608","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0899","scoring_system":"epss","scoring_elements":"0.92614","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0899","scoring_system":"epss","scoring_elements":"0.92627","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0899","scoring_system":"epss","scoring_elements":"0.92626","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0899","scoring_system":"epss","scoring_elements":"0.92629","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0899","scoring_system":"epss","scoring_elements":"0.92632","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0899","scoring_system":"epss","scoring_elements":"0.92631","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0899","scoring_system":"epss","scoring_elements":"0.92636","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0899","scoring_system":"epss","scoring_elements":"0.92648","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0899","scoring_system":"epss","scoring_elements":"0.92661","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0899","scoring_system":"epss","scoring_elements":"0.92663","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0899","scoring_system":"epss","scoring_elements":"0.92669","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22201"},{"reference_url":"https://security.archlinux.org/AVG-1770","reference_id":"AVG-1770","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1770"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371200?format=json","purl":"pkg:alpm/archlinux/gitlab@13.10.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@13.10.1-1"}],"aliases":["CVE-2021-22201"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-396g-fjpn-qucv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/240493?format=json","vulnerability_id":"VCID-3buj-yj37-mkbs","summary":"An issue has been discovered in GitLab affecting all versions starting with 12.9. GitLab was vulnerable to a stored XSS if scoped labels were used.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22199","reference_id":"","reference_type":"","scores":[{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.37812","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38161","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38298","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38321","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.3819","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.3824","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38248","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38267","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38231","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38207","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38254","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38234","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38166","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38002","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.37979","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.37883","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.37768","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.37836","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.3785","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.37761","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.37735","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22199"},{"reference_url":"https://security.archlinux.org/AVG-1770","reference_id":"AVG-1770","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1770"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371200?format=json","purl":"pkg:alpm/archlinux/gitlab@13.10.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@13.10.1-1"}],"aliases":["CVE-2021-22199"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3buj-yj37-mkbs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/240491?format=json","vulnerability_id":"VCID-gwem-yat3-ebat","summary":"An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.6 where an infinite loop exist when an authenticated user with specific rights access a MR having source and target branch pointing to each other","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22197","reference_id":"","reference_type":"","scores":[{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57727","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57546","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57631","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57652","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57628","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57682","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57685","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.577","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57679","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57659","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57689","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57664","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57622","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57642","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.5762","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57576","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57621","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57684","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57632","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.5766","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22197"},{"reference_url":"https://security.archlinux.org/AVG-1770","reference_id":"AVG-1770","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1770"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371200?format=json","purl":"pkg:alpm/archlinux/gitlab@13.10.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@13.10.1-1"}],"aliases":["CVE-2021-22197"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gwem-yat3-ebat"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/240500?format=json","vulnerability_id":"VCID-k8rh-pg4b-nubu","summary":"An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.7.9 before 13.8.7, all versions starting from 13.9 before 13.9.5, and all versions starting from 13.10 before 13.10.1. A specially crafted Wiki page allowed attackers to read arbitrary files on the server.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22203","reference_id":"","reference_type":"","scores":[{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.4725","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47272","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47308","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47329","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47275","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.4733","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47327","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47351","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47325","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47332","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.4739","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47384","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47335","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.4732","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47191","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47255","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47274","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47219","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22203"},{"reference_url":"https://security.archlinux.org/AVG-1770","reference_id":"AVG-1770","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1770"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371200?format=json","purl":"pkg:alpm/archlinux/gitlab@13.10.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@13.10.1-1"}],"aliases":["CVE-2021-22203"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k8rh-pg4b-nubu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/240495?format=json","vulnerability_id":"VCID-ktef-sqf6-ckfp","summary":"An issue has been discovered in GitLab CE/EE affecting all versions starting with 12.6. Under a special condition it was possible to access data of an internal repository through a public project fork as an anonymous user.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22200","reference_id":"","reference_type":"","scores":[{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38414","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.3868","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38817","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38837","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38766","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38816","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38827","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38839","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38802","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38775","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.3882","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38798","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38718","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38554","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38529","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38441","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38322","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38393","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38403","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38314","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.3834","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22200"},{"reference_url":"https://security.archlinux.org/AVG-1770","reference_id":"AVG-1770","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1770"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371200?format=json","purl":"pkg:alpm/archlinux/gitlab@13.10.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@13.10.1-1"}],"aliases":["CVE-2021-22200"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ktef-sqf6-ckfp"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@13.10.1-1"}