[CIVN-2026-0262] Multiple Vulnerabilities in GitLab

By Published On: May 23, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Multiple Vulnerabilities in GitLab


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: HIGH


Software Affected


GitLab Community Edition (CE) and Enterprise Edition (EE) versions prior to 18.9.7, 18.10.6, and 18.11.3

Overview


Multiple vulnerabilities have been reported in GitLab CE/EE which could allow an attacker to execute arbitrary code, cause denial of service (DoS) condition, bypass security restrictions and gain access to sensitive information on the targeted system.


Target Audience:

Organizations and individuals using GitLab CE/EE instances.


Risk Assessment:

High risk of full system compromise, system instability and sensitive information disclosure.


Impact Assessment:

Potential for unauthorized access and full system compromise.


Description


GitLab is a web-based DevOps platform that provides tools for software developments, including source code management, continuous integration and continuous deployment. It is available in both open-source Community Edition (CE) and Enterprise Edition (EE) versions.


These vulnerabilities exist in the GitLab Community Edition (CE) and Enterprise Edition (EE) due to improper input validation, improper authorization checks, missing CSRF protections, and inadequate access control mechanisms in various components. An attacker could exploit these vulnerabilities by sending specially crafted requests.


Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code, cause denial of service (DoS) condition, bypass security restrictions and gain access to sensitive information on the targeted system.


Solution


Apply appropriate updates as mentioned by the vendor:

https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-11-3-released/



Vendor Information


GitLab

https://docs.gitlab.com/releases/patches/


References


 

https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-11-3-released/


CVE Name

CVE-2025-12669

CVE-2025-13874

CVE-2025-14869

CVE-2025-14870

CVE-2026-1184

CVE-2026-1322

CVE-2026-1338

CVE-2026-1659

CVE-2026-2900

CVE-2026-3073

CVE-2026-3074

CVE-2026-3160

CVE-2026-3607

CVE-2026-4524

CVE-2026-4527

CVE-2026-5297

CVE-2026-6063

CVE-2026-6073

CVE-2026-6335

CVE-2026-6883

CVE-2026-7377

CVE-2026-7471

CVE-2026-7481

CVE-2026-8144

CVE-2026-8280




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQJPBAEBCAA5FiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmoRro0bFIAAAAAABAAO

bWFudTIsMi41KzEuMTIsMiwxAAoJEN4woHEnXMrPvggQAKY5jag5J4jvq0Ule9xN

e6vGX4GaDJ+Cb2oP0jdee74l/Wux3hCoy7s9DPEzAx39TnGk4vaA+kyr5OP1YsZ8

9ad636RJwtzEP+yd5PLq9/xPaDoVZSoQtpwZKBdSZvc/gLEgnBgt/oUlEG0AGzxb

eqst9cr1ce82BWQFEMd5D7sTk0adxhHYduHacJk4nNB/+FPzWsCMih4wRizft23E

TYKDZkot58omfWrWAVzGwFRbANf6DAmwlTDXzngegnH4FZlIbZq+QMH2nQkGt1LI

enRz/IU+JCHnDs4/bDU5vPmNqT6M27A7/7FQrQOmbIGX7Tex7LNEuXPYN5YaRP1D

7WvnSqlqOAiaH6PS+ugF+p2N7A8pjSbeK3nj0JuvVdsWJWpi4YJ1fqkT3/2WjMoX

v884cfe+TROYGMUgej1lP9Gzcpb37K0GGvuFmJOTVuHajsiLPeisk7Go3czLWPHf

t5PI6h47RtP5nyj7GF5tO7i/GInIg5sGBWkgPo4xWNHORCv/9xzp2gi/QVAbEVuH

F8F3MKezEmSLyitBmIS4X4eUq5h1z1FYzBONnT0glvt2lpMx0IQUN0D96UPR+T4j

+AoFX22SW7nD+5FUew7W5U8Fkd39G7bj44Tfol78jFz1+ciVPVcxL43EpC7xlcHU

qQI+zzaRwgOvQ0jI5hXwKqo3

=IASO

—–END PGP SIGNATURE—–

Share this article