{"id":"CVE-2022-3280","details":"An open redirect in GitLab CE/EE affecting all versions from 10.1 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allows an attacker to trick users into visiting a trustworthy URL and being redirected to arbitrary content.","aliases":["BIT-gitlab-2022-3280"],"modified":"2026-04-10T04:48:18.317971Z","published":"2022-11-09T00:00:00Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/3xxx/CVE-2022-3280.json","cna_assigner":"GitLab"},"references":[{"type":"WEB","url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3280.json"},{"type":"WEB","url":"https://hackerone.com/reports/1475686"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/3xxx/CVE-2022-3280.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3280"},{"type":"REPORT","url":"https://gitlab.com/gitlab-org/gitlab/-/issues/352611"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.com/gitlab-org/gitlab","events":[{"introduced":"8d571b146d518a979ea0cbe062abbb576a58927c"},{"fixed":"96db1338fc67d37c6d4f9e346d7847bda8605c76"}],"database_specific":{"versions":[{"introduced":"10.1"},{"fixed":"15.3.5"}]}},{"type":"GIT","repo":"https://gitlab.com/gitlab-org/gitlab","events":[{"introduced":"abbda55531f0a9d630eee1dcf2305ca499c94116"},{"fixed":"1605b0f6c099e11e1335568bc4105de5c5d2a19c"}],"database_specific":{"versions":[{"introduced":"15.4"},{"fixed":"15.4.4"}]}},{"type":"GIT","repo":"https://gitlab.com/gitlab-org/gitlab","events":[{"introduced":"af0fced4dd2e767d361f2bdc0732be15ad2c1026"},{"fixed":"767831e030c7b8b413b453d4730e92199ab7cfa3"}],"database_specific":{"versions":[{"introduced":"15.5"},{"fixed":"15.5.2"}]}}],"versions":["v15.4.0-ee","v15.4.2-ee","v15.4.3-ee","v15.5.0-ee","v15.5.1-ee"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-3280.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N"}]}