{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/256807?format=json","vulnerability_id":"VCID-99uy-2jrp-u7cx","summary":"Improper access control in GitLab CE/EE affecting all versions starting from 10.7 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, allows an attacker in possession of a deploy token to access a project's disabled wiki.","aliases":[{"alias":"CVE-2021-39936"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371831?format=json","purl":"pkg:alpm/archlinux/gitlab@14.5.2-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@14.5.2-1"},{"url":"http://public2.vulnerablecode.io/api/packages/923289?format=json","purl":"pkg:deb/debian/gitlab@15.10.8%2Bds1-2?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gitlab@15.10.8%252Bds1-2%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/923255?format=json","purl":"pkg:deb/debian/gitlab@17.6.5-19?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gitlab@17.6.5-19%3Fdistro=sid"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371830?format=json","purl":"pkg:alpm/archlinux/gitlab@14.5.0-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17gb-vdxv-fqc4"},{"vulnerability":"VCID-1f4t-7du8-q3ex"},{"vulnerability":"VCID-5t99-3qbr-sfdj"},{"vulnerability":"VCID-6ns1-mx95-5ffe"},{"vulnerability":"VCID-71j9-ra1c-6uhm"},{"vulnerability":"VCID-989x-8yn6-eqc8"},{"vulnerability":"VCID-99uy-2jrp-u7cx"},{"vulnerability":"VCID-9mm8-knzf-a3gb"},{"vulnerability":"VCID-9wuq-32s1-nydy"},{"vulnerability":"VCID-buuk-gsy3-w7bp"},{"vulnerability":"VCID-gvwq-zqmf-ruak"},{"vulnerability":"VCID-h8td-pdxx-y7en"},{"vulnerability":"VCID-j8nr-cgq2-ubf9"},{"vulnerability":"VCID-m6c7-dfbf-r7gr"},{"vulnerability":"VCID-n2jn-c1k6-67b9"},{"vulnerability":"VCID-t8nq-hx26-kfc7"},{"vulnerability":"VCID-uzq6-eukx-8yhv"},{"vulnerability":"VCID-vfvr-mjgk-4qce"},{"vulnerability":"VCID-w1jg-8rdt-3ufv"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@14.5.0-1"}],"references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-39936","reference_id":"","reference_type":"","scores":[{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.5687","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56802","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56896","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56918","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56894","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56946","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56949","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56957","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56937","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56914","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56943","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.5694","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56917","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56857","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56874","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56858","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56812","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56919","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-39936"},{"reference_url":"https://security.archlinux.org/ASA-202112-10","reference_id":"ASA-202112-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202112-10"},{"reference_url":"https://security.archlinux.org/AVG-2603","reference_id":"AVG-2603","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2603"}],"weaknesses":[],"exploits":[],"severity_range_score":"7.0 - 8.9","exploitability":"0.5","weighted_severity":"8.0","risk_score":4.0,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-99uy-2jrp-u7cx"}