Skip to main content
Mallory

GitLab Fixes DoS, Code Injection, and Access Control Flaws in Self-Managed Instances

widely-deployed-product-advisoryinternet-facing-service-vulnerabilityidentity-authentication-vulnerability
Updated April 24, 2026 at 04:01 PM4 sources
Share:
GitLab Fixes DoS, Code Injection, and Access Control Flaws in Self-Managed Instances

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

GitLab released security updates for Community Edition and Enterprise Edition in versions 18.10.3, 18.9.5, and 18.8.9, patching multiple vulnerabilities that affect self-managed deployments and urging administrators to upgrade immediately. The fixes address high-severity issues including a websocket access control flaw, denial-of-service conditions, and unintended server-side command execution tied to vulnerabilities such as CVE-2026-5173, CVE-2026-1092, and CVE-2025-12664.

The release also resolves medium- and low-severity weaknesses involving code injection, cross-site scripting, GraphQL-related denial of service, CSV import and export handling, authorization bypasses, and information disclosure affecting private projects, protected environments, and custom roles. GitLab said some affected code paths date back to versions as old as 11.3 and 12.10, while GitLab.com and GitLab Dedicated are already protected; the company added that the patches require no new migrations and can be applied to multi-node deployments without downtime, although Omnibus packages still restart services during updates.

Timeline

  1. Apr 8, 2026

    GitLab confirms hosted services already received the fixes

    GitLab stated that GitLab.com was already running the patched version and that GitLab Dedicated customers did not need to take action, indicating the fixes had already been deployed to hosted infrastructure. The company also noted the updates required no new migrations and should not require downtime for multi-node deployments.

  2. Apr 8, 2026

    GitLab releases security patches for CE and EE versions 18.10.3, 18.9.5, and 18.8.9

    On April 8, 2026, GitLab published patch releases 18.10.3, 18.9.5, and 18.8.9 for Community Edition and Enterprise Edition to fix multiple security vulnerabilities and bug fixes affecting self-managed deployments. GitLab urged all self-managed customers to upgrade immediately.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Entities

Vulnerabilities

GitLab EE GraphQL Email Address Information Disclosure (CVE-2025-9484)GitLab CE/EE WebSocket exposed method access control bypass (CVE-2026-5173)Code Injection in GitLab EE Code Quality Reports (CVE-2026-1516)Denial of Service in GitLab Terraform state lock API (CVE-2026-1092)Denial of Service in GitLab CE/EE GraphQL API (CVE-2025-12664)Cross-Site Scripting in GitLab EE customizable analytics dashboards (CVE-2026-4332)Missing Authorization in GitLab CE/EE custom role permissions (CVE-2026-4916)GitLab CE/EE Information Disclosure via CSV Export (CVE-2026-2104)Improper access control in GitLab EE Environments API (CVE-2026-1752)Denial of Service in GitLab EE GraphQL SBOM API (CVE-2026-1101)Incorrect authorization in GitLab EE vulnerability flags AI detection API (CVE-2026-2619)Denial of Service in GitLab CE/EE CSV import (CVE-2026-1403)HashiCorp Vault userpass TOTP MFA brute-force and one-time-use bypass (CVE-2025-6016)Improper authentication in GitLab Virtual Registries credential handling (CVE-2026-6515)Denial of Service in GitLab CE/EE discussions endpoint (CVE-2025-0186)XSS in GitLab CE/EE Web IDE assets via improper path validation (CVE-2026-5816)Improper access control information disclosure in GitLab CE/EE issue description rendering (CVE-2026-5377)Denial of Service in GitLab CE/EE GraphQL API (CVE-2025-3922)Improper input validation in GitLab Mermaid sandbox allows unauthorized content loading in another user's browser (CVE-2026-3254)Cross-site scripting in GitLab Storybook development environment (CVE-2026-5262)CSRF in GitLab CE/EE GraphQL API (CVE-2026-4922)Denial of Service in GitLab CE/EE issue import (CVE-2026-1660)Authorization bypass in GitLab CE/EE group fork prevention (CVE-2025-9957)

Sources

thecyberexpress com vulnerabilities
GitLab Security Update Fixes CVE-2026-5173 Flaw
April 10, 2026 at 06:29 AM
April 8, 2026 at 12:00 AM

Related Stories

GitLab Security Update Fixes Web IDE Token Theft and DoS Vulnerabilities

GitLab Security Update Fixes Web IDE Token Theft and DoS Vulnerabilities

GitLab released security updates for *Community Edition (CE)* and *Enterprise Edition (EE)*, shipping patched versions **18.8.4**, **18.7.4**, and **18.6.6** for self-managed deployments (with GitLab.com already remediated). The most severe issue, **CVE-2025-7659** (CVSS **8.0**), was attributed to *incomplete validation* in the **Web IDE** that could allow an **unauthenticated** attacker to steal access tokens and use them to access **private repositories**. The same release also addressed multiple high-severity availability and client-side issues, including **CVE-2025-8099** (CVSS **7.5**) enabling **DoS** via repeated/complex **GraphQL** queries and **CVE-2026-0958** (CVSS **7.5**) enabling resource exhaustion by bypassing **JSON validation middleware** limits. Additional fixes included CPU-exhaustion vectors involving specially crafted **Markdown** processing (e.g., **CVE-2026-1456** and **CVE-2026-1458**) and an **XSS** issue in code flow functionality (**CVE-2025-14560**, CVSS **7.3**) that could enable malicious script execution in a victim’s browser session.

1 months ago
GitLab Patches XSS and API Denial-of-Service Vulnerabilities in CE/EE

GitLab Patches XSS and API Denial-of-Service Vulnerabilities in CE/EE

GitLab released security updates for **GitLab Community Edition (CE)** and **Enterprise Edition (EE)**, shipping patched versions **18.9.2**, **18.8.6**, and **18.7.6** to address multiple vulnerabilities affecting self-managed deployments. The Canadian Centre for Cyber Security issued advisory **AV26-222** urging organizations to review GitLab’s upstream advisory and apply the updates for any instances running versions prior to those releases. The update fixes **15 security issues**, including a high-severity **XSS** vulnerability (**CVE-2026-1090**, CVSS 8.7) in Markdown placeholder processing when the relevant feature flag is enabled, which could allow an authenticated attacker to inject malicious JavaScript into a victim’s browser. GitLab also addressed several **denial-of-service** conditions, including issues impacting the **GraphQL API** (resource exhaustion via recursion), repository archive endpoints, and JSON payload validation in the protected branches API; additional fixes include webhook-related DoS risks (e.g., **CVE-2025-13690**, **CVE-2025-12576**) and a **CRLF sequence** handling issue (**CVE-2026-3848**).

1 months ago
GitLab Patches High-Severity 2FA Bypass and DoS Vulnerabilities in CE/EE

GitLab Patches High-Severity 2FA Bypass and DoS Vulnerabilities in CE/EE

GitLab released security updates for self-managed **GitLab Community Edition (CE)** and **Enterprise Edition (EE)** to fix a high-severity **two-factor authentication (2FA) bypass** and multiple **denial-of-service (DoS)** flaws. The most significant issue, **CVE-2026-0723** (CVSS 7.4), is an *unchecked return value* weakness in authentication services that could allow an attacker with knowledge of a victim’s credential/account ID to bypass 2FA by submitting forged device responses. GitLab also patched DoS vulnerabilities affecting unauthenticated and authenticated scenarios, including crafted malformed authentication data against the **Jira Connect** integration (**CVE-2025-13927**), incorrect authorization validation in API endpoints such as the **Releases API** (**CVE-2025-13928**), malformed Wiki documents that bypass cycle detection (**CVE-2025-13335**), and repeated malformed SSH authentication requests (**CVE-2026-1102**). Fixed releases are **18.8.2**, **18.7.2**, and **18.6.4**; GitLab advised administrators to upgrade immediately, noting *GitLab.com* is already patched, while third-party tracking indicated thousands of exposed GitLab CE instances remain online and potentially at risk if unpatched.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.