Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://issues.gerritcodereview.com/issues/486131256 |
|
Wed, 13 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gerrit
Gerrit gerrit |
|
| Vendors & Products |
Gerrit
Gerrit gerrit |
Wed, 13 May 2026 06:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Incorrect authorization in the "submitted together" feature in Gerrit versions 2.12 and later allows an authenticated attacker with force push permissions on a secondary branch to bypass code review and forcefully submit code to restricted branches via a crafted submission matching the "topic" tag of an unapproved change. | |
| Title | Improper Authorization in Gerrit allowing Code Review Bypass via "Submitted Together" | |
| Weaknesses | CWE-863 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2026-05-13T14:44:08.541Z
Reserved: 2026-02-18T21:50:06.426Z
Link: CVE-2026-2725
Updated: 2026-05-13T14:44:05.432Z
Status : Awaiting Analysis
Published: 2026-05-13T06:16:14.090
Modified: 2026-05-13T16:16:38.627
Link: CVE-2026-2725
No data.
OpenCVE Enrichment
Updated: 2026-05-13T10:34:46Z