### [CVE-2021-22171](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22171) ![](https://img.shields.io/static/v1?label=Product&message=GitLab&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3E%3D11.5.0%2C%20%3C13.5.6%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3E%3D13.6.0%2C%20%3C13.6.4%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3E%3D13.7.0%2C%20%3C13.7.2%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Improper%20authentication%20in%20GitLab&color=brightgreen) ### Description Insufficient validation of authentication parameters in GitLab Pages for GitLab 11.5+ allows an attacker to steal a victim's API token if they click on a maliciously crafted link ### POC #### Reference - https://gitlab.com/gitlab-org/gitlab-pages/-/issues/262 #### Github No PoCs found on GitHub currently.