GitLab patches CSRF and XSS flaws enabling token theft and browser-side code execution
GitLab disclosed and remediated three high-severity vulnerabilities in GitLab CE/EE that could be exploited by unauthenticated attackers under certain conditions. CVE-2026-4922 is a cross-site request forgery flaw (CWE-352) that could let an attacker trigger GraphQL mutations as an authenticated user, while CVE-2026-5262 is a cross-site scripting issue (CWE-79) that could expose tokens in the Storybook development environment. GitLab also fixed CVE-2026-5816, an improper path validation flaw (CWE-41) that could allow arbitrary JavaScript execution in a victim’s browser session.
The issues affect multiple GitLab CE/EE release lines, with patched versions identified as 18.9.6, 18.10.4, and 18.11.1 depending on the flaw. CVE-2026-4922 affects versions from 17.0 before 18.9.6, 18.10 before 18.10.4, and 18.11 before 18.11.1; CVE-2026-5262 affects versions from 16.1.0 before 18.9.6, 18.10 before 18.10.4, and 18.11 before 18.11.1; and CVE-2026-5816 affects 18.10 before 18.10.4 and 18.11 before 18.11.1. The vulnerabilities carry CVSS v3.1 ratings reflecting high confidentiality and integrity impact, and GitLab linked the disclosures to its patch release notice, internal work items, and HackerOne reports.
Timeline
Apr 22, 2026
CVE record for CVE-2026-4922 is received by GitLab CNA
The CVE entry for CVE-2026-4922 was newly received by cve@gitlab.com, indicating formal CVE intake for the CSRF issue affecting GitLab CE/EE. The record tied the vulnerability to GitLab's April 22 patch release and related disclosure artifacts.
Apr 22, 2026
GitLab publicly discloses CVE-2026-4922, CVE-2026-5262, and CVE-2026-5816
GitLab disclosed details for three high-severity vulnerabilities on April 22, 2026, including affected versions, impact, CWE classifications, and CVSS vectors. The disclosures stated the flaws had been remediated and referenced GitLab patch release notes, internal work items, and HackerOne reports.
Apr 22, 2026
GitLab releases patches for three CE/EE vulnerabilities
GitLab issued patched releases 18.9.6, 18.10.4, and 18.11.1 to remediate three vulnerabilities affecting GitLab CE/EE: CVE-2026-4922 (CSRF in GraphQL mutations), CVE-2026-5262 (XSS/input validation issue exposing tokens in Storybook), and CVE-2026-5816 (path equivalence issue enabling arbitrary JavaScript execution). The fixes covered affected version ranges spanning 16.1.0 through 18.11 depending on the flaw.
See the full picture in Mallory
Mallory subscribers get deeper analysis on every story, including:
Who’s affected and how
Deep-dive technical analysis
Actionable next steps for your team
IPs, domains, hashes, and more
Ask questions and take action on every story
Filter by topic, classification, timeframe
Get matching stories delivered automatically
Sources
Related Stories

GitLab Patches CSRF and WebSocket Access Control Flaws in CE/EE
GitLab disclosed and remediated two high-severity vulnerabilities in GitLab CE/EE that could expose sensitive data and enable unauthorized actions. **CVE-2026-3857** is a `CWE-352` cross-site request forgery flaw in GitLab GraphQL functionality caused by insufficient CSRF protection, allowing an unauthenticated attacker to trigger arbitrary GraphQL mutations on behalf of an authenticated user if that user can be induced to interact. The issue affects versions from `17.10` before `18.8.7`, `18.9` before `18.9.3`, and `18.10` before `18.10.1`. GitLab also fixed **CVE-2026-5173**, a `CWE-749` improper access control issue that lets an authenticated user invoke unintended server-side methods over websocket connections. That flaw affects versions from `16.9.6` before `18.8.9`, `18.9` before `18.9.5`, and `18.10` before `18.10.3`, with GitLab rating it as network-exploitable with low attack complexity and significant confidentiality impact. GitLab published patch release information and related work items for both vulnerabilities, urging customers to update affected self-managed deployments to the fixed releases.
3 weeks ago
GitLab Patches XSS and API Denial-of-Service Vulnerabilities in CE/EE
GitLab released security updates for **GitLab Community Edition (CE)** and **Enterprise Edition (EE)**, shipping patched versions **18.9.2**, **18.8.6**, and **18.7.6** to address multiple vulnerabilities affecting self-managed deployments. The Canadian Centre for Cyber Security issued advisory **AV26-222** urging organizations to review GitLab’s upstream advisory and apply the updates for any instances running versions prior to those releases. The update fixes **15 security issues**, including a high-severity **XSS** vulnerability (**CVE-2026-1090**, CVSS 8.7) in Markdown placeholder processing when the relevant feature flag is enabled, which could allow an authenticated attacker to inject malicious JavaScript into a victim’s browser. GitLab also addressed several **denial-of-service** conditions, including issues impacting the **GraphQL API** (resource exhaustion via recursion), repository archive endpoints, and JSON payload validation in the protected branches API; additional fixes include webhook-related DoS risks (e.g., **CVE-2025-13690**, **CVE-2025-12576**) and a **CRLF sequence** handling issue (**CVE-2026-3848**).
1 months ago
GitLab Patches High-Severity 2FA Bypass and DoS Vulnerabilities in CE/EE
GitLab released security updates for self-managed **GitLab Community Edition (CE)** and **Enterprise Edition (EE)** to fix a high-severity **two-factor authentication (2FA) bypass** and multiple **denial-of-service (DoS)** flaws. The most significant issue, **CVE-2026-0723** (CVSS 7.4), is an *unchecked return value* weakness in authentication services that could allow an attacker with knowledge of a victim’s credential/account ID to bypass 2FA by submitting forged device responses. GitLab also patched DoS vulnerabilities affecting unauthenticated and authenticated scenarios, including crafted malformed authentication data against the **Jira Connect** integration (**CVE-2025-13927**), incorrect authorization validation in API endpoints such as the **Releases API** (**CVE-2025-13928**), malformed Wiki documents that bypass cycle detection (**CVE-2025-13335**), and repeated malformed SSH authentication requests (**CVE-2026-1102**). Fixed releases are **18.8.2**, **18.7.2**, and **18.6.4**; GitLab advised administrators to upgrade immediately, noting *GitLab.com* is already patched, while third-party tracking indicated thousands of exposed GitLab CE instances remain online and potentially at risk if unpatched.
1 months ago