Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-4527 (GCVE-0-2026-4527)
Vulnerability from cvelistv5 – Published: 2026-05-14 05:34 – Updated: 2026-05-14 13:22- CWE-352 - Cross-Site Request Forgery (CSRF)
| URL | Tags |
|---|---|
| https://gitlab.com/gitlab-org/gitlab/-/work_items… | |
| https://hackerone.com/reports/3590487 | technical-descriptionexploitpermissions-required |
| https://about.gitlab.com/releases/2026/05/13/patc… |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-4527",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-05-14T13:22:26.022452Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-05-14T13:22:37.251Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "GitLab",
"repo": "git://git@gitlab.com:gitlab-org/gitlab.git",
"vendor": "GitLab",
"versions": [
{
"lessThan": "18.9.7",
"status": "affected",
"version": "11.10",
"versionType": "semver"
},
{
"lessThan": "18.10.6",
"status": "affected",
"version": "18.10",
"versionType": "semver"
},
{
"lessThan": "18.11.3",
"status": "affected",
"version": "18.11",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Thanks [maksyche](https://hackerone.com/maksyche) for reporting this vulnerability through our HackerOne bug bounty program"
}
],
"descriptions": [
{
"lang": "en",
"value": "GitLab has remediated an issue in GitLab CE/EE affecting all versions from 11.10 before 18.9.7, 18.10 before 18.10.6, and 18.11 before 18.11.3 that could have allowed an unauthenticated user to create unauthorized Jira subscriptions for a targeted user\u0027s namespace via a specially crafted link due to missing CSRF protection."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-352",
"description": "CWE-352: Cross-Site Request Forgery (CSRF)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-05-14T05:34:32.344Z",
"orgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a",
"shortName": "GitLab"
},
"references": [
{
"url": "https://gitlab.com/gitlab-org/gitlab/-/work_items/594339"
},
{
"name": "HackerOne Bug Bounty Report #3590487",
"tags": [
"technical-description",
"exploit",
"permissions-required"
],
"url": "https://hackerone.com/reports/3590487"
},
{
"url": "https://about.gitlab.com/releases/2026/05/13/patch-release-gitlab-18-11-3-released/"
}
],
"solutions": [
{
"lang": "en",
"value": "Upgrade to versions 18.9.7, 18.10.6, 18.11.3 or above."
}
],
"title": "Cross-Site Request Forgery (CSRF) in GitLab"
}
},
"cveMetadata": {
"assignerOrgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a",
"assignerShortName": "GitLab",
"cveId": "CVE-2026-4527",
"datePublished": "2026-05-14T05:34:32.344Z",
"dateReserved": "2026-03-20T20:33:50.858Z",
"dateUpdated": "2026-05-14T13:22:37.251Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-4527",
"date": "2026-05-16",
"epss": "0.0001",
"percentile": "0.01209"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-4527\",\"sourceIdentifier\":\"cve@gitlab.com\",\"published\":\"2026-05-14T06:16:23.810\",\"lastModified\":\"2026-05-15T19:56:04.503\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"GitLab has remediated an issue in GitLab CE/EE affecting all versions from 11.10 before 18.9.7, 18.10 before 18.10.6, and 18.11 before 18.11.3 that could have allowed an unauthenticated user to create unauthorized Jira subscriptions for a targeted user\u0027s namespace via a specially crafted link due to missing CSRF protection.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cve@gitlab.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"cve@gitlab.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-352\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*\",\"versionStartIncluding\":\"11.10.0\",\"versionEndExcluding\":\"18.9.7\",\"matchCriteriaId\":\"6BF14399-2C83-416B-A608-6A8E50E03254\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*\",\"versionStartIncluding\":\"11.10.0\",\"versionEndExcluding\":\"18.9.7\",\"matchCriteriaId\":\"89AA9E0E-F6CD-4FAB-8782-F2FF39365F4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*\",\"versionStartIncluding\":\"18.10.0\",\"versionEndExcluding\":\"18.10.6\",\"matchCriteriaId\":\"98488AF5-9D73-47EC-B7CB-41766FBC3774\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*\",\"versionStartIncluding\":\"18.10.0\",\"versionEndExcluding\":\"18.10.6\",\"matchCriteriaId\":\"E79D4F10-88B3-4AA7-BC5E-3FC8FA698969\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*\",\"versionStartIncluding\":\"18.11.0\",\"versionEndExcluding\":\"18.11.3\",\"matchCriteriaId\":\"4215ACCD-67B6-4394-AD76-1CE39077FCD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*\",\"versionStartIncluding\":\"18.11.0\",\"versionEndExcluding\":\"18.11.3\",\"matchCriteriaId\":\"DA0D6580-3530-4D76-81CE-D852BCE0D411\"}]}]}],\"references\":[{\"url\":\"https://about.gitlab.com/releases/2026/05/13/patch-release-gitlab-18-11-3-released/\",\"source\":\"cve@gitlab.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://gitlab.com/gitlab-org/gitlab/-/work_items/594339\",\"source\":\"cve@gitlab.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://hackerone.com/reports/3590487\",\"source\":\"cve@gitlab.com\",\"tags\":[\"Permissions Required\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-4527\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-05-14T13:22:26.022452Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-05-14T13:22:32.475Z\"}}], \"cna\": {\"title\": \"Cross-Site Request Forgery (CSRF) in GitLab\", \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Thanks [maksyche](https://hackerone.com/maksyche) for reporting this vulnerability through our HackerOne bug bounty program\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*\"], \"repo\": \"git://git@gitlab.com:gitlab-org/gitlab.git\", \"vendor\": \"GitLab\", \"product\": \"GitLab\", \"versions\": [{\"status\": \"affected\", \"version\": \"11.10\", \"lessThan\": \"18.9.7\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"18.10\", \"lessThan\": \"18.10.6\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"18.11\", \"lessThan\": \"18.11.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"Upgrade to versions 18.9.7, 18.10.6, 18.11.3 or above.\"}], \"references\": [{\"url\": \"https://gitlab.com/gitlab-org/gitlab/-/work_items/594339\"}, {\"url\": \"https://hackerone.com/reports/3590487\", \"name\": \"HackerOne Bug Bounty Report #3590487\", \"tags\": [\"technical-description\", \"exploit\", \"permissions-required\"]}, {\"url\": \"https://about.gitlab.com/releases/2026/05/13/patch-release-gitlab-18-11-3-released/\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"GitLab has remediated an issue in GitLab CE/EE affecting all versions from 11.10 before 18.9.7, 18.10 before 18.10.6, and 18.11 before 18.11.3 that could have allowed an unauthenticated user to create unauthorized Jira subscriptions for a targeted user\u0027s namespace via a specially crafted link due to missing CSRF protection.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-352\", \"description\": \"CWE-352: Cross-Site Request Forgery (CSRF)\"}]}], \"providerMetadata\": {\"orgId\": \"ceab7361-8a18-47b1-92ba-4d7d25f6715a\", \"shortName\": \"GitLab\", \"dateUpdated\": \"2026-05-14T05:34:32.344Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-4527\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-05-14T13:22:37.251Z\", \"dateReserved\": \"2026-03-20T20:33:50.858Z\", \"assignerOrgId\": \"ceab7361-8a18-47b1-92ba-4d7d25f6715a\", \"datePublished\": \"2026-05-14T05:34:32.344Z\", \"assignerShortName\": \"GitLab\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
GHSA-RW3W-8J7H-FWR2
Vulnerability from github – Published: 2026-05-14 06:31 – Updated: 2026-05-14 06:31GitLab has remediated an issue in GitLab CE/EE affecting all versions from 11.10 before 18.9.7, 18.10 before 18.10.6, and 18.11 before 18.11.3 that could have allowed an unauthenticated user to create unauthorized Jira subscriptions for a targeted user's namespace via a specially crafted link due to missing CSRF protection.
{
"affected": [],
"aliases": [
"CVE-2026-4527"
],
"database_specific": {
"cwe_ids": [
"CWE-352"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-05-14T06:16:23Z",
"severity": "MODERATE"
},
"details": "GitLab has remediated an issue in GitLab CE/EE affecting all versions from 11.10 before 18.9.7, 18.10 before 18.10.6, and 18.11 before 18.11.3 that could have allowed an unauthenticated user to create unauthorized Jira subscriptions for a targeted user\u0027s namespace via a specially crafted link due to missing CSRF protection.",
"id": "GHSA-rw3w-8j7h-fwr2",
"modified": "2026-05-14T06:31:33Z",
"published": "2026-05-14T06:31:33Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4527"
},
{
"type": "WEB",
"url": "https://hackerone.com/reports/3590487"
},
{
"type": "WEB",
"url": "https://about.gitlab.com/releases/2026/05/13/patch-release-gitlab-18-11-3-released"
},
{
"type": "WEB",
"url": "https://gitlab.com/gitlab-org/gitlab/-/work_items/594339"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2026-4527
Vulnerability from fkie_nvd - Published: 2026-05-14 06:16 - Updated: 2026-05-15 19:56{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"matchCriteriaId": "6BF14399-2C83-416B-A608-6A8E50E03254",
"versionEndExcluding": "18.9.7",
"versionStartIncluding": "11.10.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "89AA9E0E-F6CD-4FAB-8782-F2FF39365F4B",
"versionEndExcluding": "18.9.7",
"versionStartIncluding": "11.10.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"matchCriteriaId": "98488AF5-9D73-47EC-B7CB-41766FBC3774",
"versionEndExcluding": "18.10.6",
"versionStartIncluding": "18.10.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "E79D4F10-88B3-4AA7-BC5E-3FC8FA698969",
"versionEndExcluding": "18.10.6",
"versionStartIncluding": "18.10.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"matchCriteriaId": "4215ACCD-67B6-4394-AD76-1CE39077FCD2",
"versionEndExcluding": "18.11.3",
"versionStartIncluding": "18.11.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "DA0D6580-3530-4D76-81CE-D852BCE0D411",
"versionEndExcluding": "18.11.3",
"versionStartIncluding": "18.11.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "GitLab has remediated an issue in GitLab CE/EE affecting all versions from 11.10 before 18.9.7, 18.10 before 18.10.6, and 18.11 before 18.11.3 that could have allowed an unauthenticated user to create unauthorized Jira subscriptions for a targeted user\u0027s namespace via a specially crafted link due to missing CSRF protection."
}
],
"id": "CVE-2026-4527",
"lastModified": "2026-05-15T19:56:04.503",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "cve@gitlab.com",
"type": "Secondary"
}
]
},
"published": "2026-05-14T06:16:23.810",
"references": [
{
"source": "cve@gitlab.com",
"tags": [
"Release Notes"
],
"url": "https://about.gitlab.com/releases/2026/05/13/patch-release-gitlab-18-11-3-released/"
},
{
"source": "cve@gitlab.com",
"tags": [
"Broken Link"
],
"url": "https://gitlab.com/gitlab-org/gitlab/-/work_items/594339"
},
{
"source": "cve@gitlab.com",
"tags": [
"Permissions Required"
],
"url": "https://hackerone.com/reports/3590487"
}
],
"sourceIdentifier": "cve@gitlab.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-352"
}
],
"source": "cve@gitlab.com",
"type": "Primary"
}
]
}
CERTFR-2026-AVI-0593
Vulnerability from certfr_avis - Published: 2026-05-15 - Updated: 2026-05-15
De multiples vulnérabilités ont été découvertes dans GitLab. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une atteinte à la confidentialité des données et une falsification de requêtes côté serveur (SSRF).
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| GitLab | N/A | GitLab Community Edition (CE) et Gitlab Enterprise Edition (EE) versions 18.10.x antérieures à 18.10.6 | ||
| GitLab | N/A | GitLab Community Edition (CE) et Gitlab Enterprise Edition (EE) versions antérieures à 18.9.7 | ||
| GitLab | N/A | GitLab Community Edition (CE) et Gitlab Enterprise Edition (EE) versions 18.11.x antérieures à 18.11.3 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "GitLab Community Edition (CE) et Gitlab Enterprise Edition (EE) versions 18.10.x ant\u00e9rieures \u00e0 18.10.6",
"product": {
"name": "N/A",
"vendor": {
"name": "GitLab",
"scada": false
}
}
},
{
"description": "GitLab Community Edition (CE) et Gitlab Enterprise Edition (EE) versions ant\u00e9rieures \u00e0 18.9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "GitLab",
"scada": false
}
}
},
{
"description": "GitLab Community Edition (CE) et Gitlab Enterprise Edition (EE) versions 18.11.x ant\u00e9rieures \u00e0 18.11.3",
"product": {
"name": "N/A",
"vendor": {
"name": "GitLab",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-12669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12669"
},
{
"name": "CVE-2026-4524",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4524"
},
{
"name": "CVE-2026-7481",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-7481"
},
{
"name": "CVE-2026-3074",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3074"
},
{
"name": "CVE-2026-6073",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6073"
},
{
"name": "CVE-2026-5297",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5297"
},
{
"name": "CVE-2026-1184",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1184"
},
{
"name": "CVE-2026-2900",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2900"
},
{
"name": "CVE-2025-14870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14870"
},
{
"name": "CVE-2026-7377",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-7377"
},
{
"name": "CVE-2026-6335",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6335"
},
{
"name": "CVE-2026-1322",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1322"
},
{
"name": "CVE-2026-3160",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3160"
},
{
"name": "CVE-2026-7471",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-7471"
},
{
"name": "CVE-2026-1338",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1338"
},
{
"name": "CVE-2025-13874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13874"
},
{
"name": "CVE-2026-6883",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6883"
},
{
"name": "CVE-2026-8144",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-8144"
},
{
"name": "CVE-2026-8280",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-8280"
},
{
"name": "CVE-2026-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4527"
},
{
"name": "CVE-2026-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3607"
},
{
"name": "CVE-2025-14869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14869"
},
{
"name": "CVE-2026-6063",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6063"
},
{
"name": "CVE-2026-1659",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1659"
},
{
"name": "CVE-2026-3073",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3073"
}
],
"initial_release_date": "2026-05-15T00:00:00",
"last_revision_date": "2026-05-15T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0593",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-05-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans GitLab. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF).",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans GitLab",
"vendor_advisories": [
{
"published_at": "2026-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 GitLab",
"url": "https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-11-3-released/"
}
]
}
NCSC-2026-0161
Vulnerability from csaf_ncscnl - Published: 2026-05-15 09:27 - Updated: 2026-05-15 09:27GitLab versions 13.7 to before 18.9.7, 18.10 to before 18.10.6, and 18.11 to before 18.11.3 contained a vulnerability allowing authenticated users to view Jira issues outside their project scope due to insufficient enforcement of access restrictions in an integration filter.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
GitLab / Community Edition, Enterprise Edition
|
vers:unknown/* |
GitLab addressed a security vulnerability affecting versions 11.10 through 18.11.3 that allowed unauthenticated users to create unauthorized Jira subscriptions due to a missing CSRF protection flaw.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
GitLab / Community Edition, Enterprise Edition
|
vers:unknown/* |
GitLab addressed a denial of service vulnerability affecting GitLab CE/EE versions 9.0 through 18.11.3, exploitable by unauthenticated users via specially crafted requests due to insufficient input validation.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
GitLab / Community Edition, Enterprise Edition
|
vers:unknown/* |
GitLab addressed a security flaw in versions prior to 18.9.7, 18.10.6, and 18.11.3 where authenticated users with developer permissions could delete protected container registry tags due to improper authorization checks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
GitLab / Community Edition, Enterprise Edition
|
vers:unknown/* |
GitLab addressed a security vulnerability in specific GitLab EE versions where authenticated users with control over a virtual registry upstream could send unauthorized requests to internal hosts due to improper validation.
CWE-918 - Server-Side Request Forgery (SSRF)| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
GitLab / Community Edition, Enterprise Edition
|
vers:unknown/* |
GitLab fixed a vulnerability in multiple Enterprise Edition versions that allowed authenticated users to bypass merge request approval requirements due to improper cleanup of orphaned policy records.
CWE-862 - Missing Authorization| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
GitLab / Community Edition, Enterprise Edition
|
vers:unknown/* |
GitLab addressed a security flaw in versions 16.7 to before 18.9.7, 18.10 to before 18.10.6, and 18.11 to before 18.11.3 that allowed unauthenticated users to download private debugging symbols from restricted projects due to improper access control.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
GitLab / Community Edition, Enterprise Edition
|
vers:unknown/* |
GitLab EE versions contained a security flaw allowing authenticated users to execute arbitrary JavaScript in other users' browsers via customizable analytics dashboards due to improper input sanitization.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
GitLab / Community Edition, Enterprise Edition
|
vers:unknown/* |
GitLab versions 8.3 through before 18.9.7, 18.10 before 18.10.6, and 18.11 before 18.11.3 contained a vulnerability allowing authenticated users to cause denial of service via excessive memory use due to improper input validation.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
GitLab / Community Edition, Enterprise Edition
|
vers:unknown/* |
GitLab versions 18.9.1 to before 18.9.7, 18.10 to before 18.10.6, and 18.11 to before 18.11.3 contained a security flaw allowing authenticated users to access confidential issue content in public projects due to improper authorization checks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
GitLab / Community Edition, Enterprise Edition
|
vers:unknown/* |
GitLab addressed a security vulnerability in versions 15.1 to before 18.9.7, 18.10 to before 18.10.6, and 18.11 to before 18.11.3 that allowed authenticated project members to enumerate private group members due to missing authorization checks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
GitLab / Community Edition, Enterprise Edition
|
vers:unknown/* |
GitLab addressed a denial of service vulnerability in certain GitLab EE versions caused by improper validation of specially crafted file uploads allowing unauthenticated users to disrupt service.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
GitLab / Community Edition, Enterprise Edition
|
vers:unknown/* |
GitLab addressed a security vulnerability in versions 16.0 to before 18.9.7, 18.10 to before 18.10.6, and 18.11 to before 18.11.3 that allowed authenticated users with read_api scoped OAuth tokens to improperly create and comment on issues in private projects.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
GitLab / Community Edition, Enterprise Edition
|
vers:unknown/* |
GitLab addressed a security flaw in multiple GitLab EE versions that allowed authenticated developers to execute arbitrary JavaScript in other users' browsers due to improper input sanitization.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
GitLab / Community Edition, Enterprise Edition
|
vers:unknown/* |
GitLab versions 18.11 to before 18.11.3 contained a vulnerability allowing authenticated users to execute arbitrary code in other users' browser sessions due to improper input sanitization.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
GitLab / Community Edition, Enterprise Edition
|
vers:unknown/* |
GitLab addressed a security flaw in versions 17.6 to before 18.9.7, 18.10 to before 18.10.6, and 18.11 to before 18.11.3 that allowed authenticated developers to bypass PyPI package restrictions due to improper authorization checks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
GitLab / Community Edition, Enterprise Edition
|
vers:unknown/* |
GitLab addressed a vulnerability in multiple versions that allowed authenticated users to inject HTML and JavaScript into email notifications due to improper input sanitization.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
GitLab / Community Edition, Enterprise Edition
|
vers:unknown/* |
GitLab addressed a security flaw in specific GitLab EE versions where authenticated users could execute arbitrary JavaScript in other users' browsers due to insufficient input sanitization.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
GitLab / Community Edition, Enterprise Edition
|
vers:unknown/* |
GitLab fixed a security vulnerability in GitLab EE versions before 18.9.7, 18.10.6, and 18.11.3 where Maintainers could bypass instance-level approval rule editing restrictions due to missing authorization checks.
CWE-862 - Missing Authorization| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
GitLab / Community Edition, Enterprise Edition
|
vers:unknown/* |
GitLab addressed a security vulnerability in specific versions where authenticated users with developer permissions could bypass access controls to remove code owner approval rules from merge requests.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
GitLab / Community Edition, Enterprise Edition
|
vers:unknown/* |
GitLab addressed a security vulnerability in versions 15.1 to before 18.9.7, 18.10 to before 18.10.6, and 18.11 to before 18.11.3 that permitted authenticated users with Guest permissions to access unauthorized project issues.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
GitLab / Community Edition, Enterprise Edition
|
vers:unknown/* |
GitLab addressed a security vulnerability in versions 18.3 to before 18.9.7, 18.10 to before 18.10.6, and 18.11 to before 18.11.3 that allowed authenticated users with developer roles to bypass package protection rules due to improper access control.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
GitLab / Community Edition, Enterprise Edition
|
vers:unknown/* |
GitLab addressed a denial of service vulnerability caused by insufficient input validation in versions 18.5 to before 18.9.7, 18.10 to before 18.10.6, and 18.11 to before 18.11.3, exploitable via crafted JSON payloads by unauthenticated users.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
GitLab / Community Edition, Enterprise Edition
|
vers:unknown/* |
GitLab addressed a denial of service vulnerability affecting versions 18.5 to before 18.9.7, 18.10 to before 18.10.6, and 18.11 to before 18.11.3, exploitable via specially crafted API payloads by unauthenticated users.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
GitLab / Community Edition, Enterprise Edition
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
GitLab / Community Edition, Enterprise Edition
|
vers:unknown/* |
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "GitLab Inc. heeft meerdere kwetsbaarheden verholpen in GitLab Community Edition (CE) en Enterprise Edition (EE) in diverse versies, met name in releases van versie 8.3 tot en met 18.11.3.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden betreffen verschillende componenten en functionaliteiten binnen GitLab, waaronder de Jira-integratie, container registry, virtual registry upstreams, merge request approval policies, debugging symbol downloads, analytics dashboards, package management, issue tracking, project- en groepslidmaatschapsbeheer, en API inputvalidatie. \n\nAanvallers kunnen onder meer:\n- Authenticeerde gebruikers kunnen Jira-issues buiten hun projecttoegang bekijken door onvoldoende toegangscontrole.\n- Ongeauthenticeerde gebruikers kunnen zonder CSRF-bescherming ongeautoriseerde Jira-subscripties aanmaken.\n- Ongeauthenticeerde gebruikers kunnen door onvoldoende inputvalidatie een denial-of-service veroorzaken via speciaal opgemaakte verzoeken of uploads.\n- Authenticeerde gebruikers met ontwikkelaarsrechten kunnen beschermde container registry tags verwijderen en package protection regels omzeilen.\n- Authenticeerde gebruikers kunnen merge request goedkeuringsvereisten omzeilen door het verwijderen van approval rules.\n- Ongeautoriseerde toegang tot interne hosts is mogelijk via virtual registry upstreams door onvoldoende validatie.\n- Cross-site scripting (XSS) aanvallen zijn mogelijk door onvoldoende inputsanitatie in analytics dashboards, e-mail notificaties en andere gebruikersinvoervelden.\n- OAuth tokens met read_api scope kunnen misbruikt worden om issues in private projecten aan te maken en te becommentari\u00ebren.\n- Authenticeerde gebruikers met Guest-permissies kunnen toegang krijgen tot projectissues die beperkt zouden moeten zijn.\n- Ongeautoriseerde gebruikers kunnen private groepslidmaatschappen enumereren.\n\nDeze kwetsbaarheden zijn aanwezig in meerdere opeenvolgende versies van GitLab CE en EE, wat wijst op terugkerende problemen in toegangscontrole, inputvalidatie en autorisatie binnen het platform.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "GitLab Inc. heeft updates en patches uitgebracht voor de genoemde versies om de diverse kwetsbaarheden te verhelpen. Gebruikers wordt geadviseerd de meest recente updates te installeren om de beveiliging van hun GitLab-omgevingen te waarborgen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "general",
"text": "Authentication Bypass Using an Alternate Path or Channel",
"title": "CWE-288"
},
{
"category": "general",
"text": "Cross-Site Request Forgery (CSRF)",
"title": "CWE-352"
},
{
"category": "general",
"text": "Unintended Proxy or Intermediary (\u0027Confused Deputy\u0027)",
"title": "CWE-441"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Business Logic Errors",
"title": "CWE-840"
},
{
"category": "general",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "general",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "Access Control Check Implemented After Asset is Accessed",
"title": "CWE-1280"
},
{
"category": "general",
"text": "Improper Validation of Specified Quantity in Input",
"title": "CWE-1284"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-11-3-released/"
}
],
"title": "Kwetsbaarheden verholpen in GitLab door GitLab Inc.",
"tracking": {
"current_release_date": "2026-05-15T09:27:01.154820Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.3"
}
},
"id": "NCSC-2026-0161",
"initial_release_date": "2026-05-15T09:27:01.154820Z",
"revision_history": [
{
"date": "2026-05-15T09:27:01.154820Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-1"
}
}
],
"category": "product_name",
"name": "Community Edition, Enterprise Edition"
}
],
"category": "vendor",
"name": "GitLab"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-3160",
"cwe": {
"id": "CWE-441",
"name": "Unintended Proxy or Intermediary (\u0027Confused Deputy\u0027)"
},
"notes": [
{
"category": "other",
"text": "Unintended Proxy or Intermediary (\u0027Confused Deputy\u0027)",
"title": "CWE-441"
},
{
"category": "description",
"text": "GitLab versions 13.7 to before 18.9.7, 18.10 to before 18.10.6, and 18.11 to before 18.11.3 contained a vulnerability allowing authenticated users to view Jira issues outside their project scope due to insufficient enforcement of access restrictions in an integration filter.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-3160 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-3160.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2026-3160"
},
{
"cve": "CVE-2026-4527",
"cwe": {
"id": "CWE-352",
"name": "Cross-Site Request Forgery (CSRF)"
},
"notes": [
{
"category": "other",
"text": "Cross-Site Request Forgery (CSRF)",
"title": "CWE-352"
},
{
"category": "description",
"text": "GitLab addressed a security vulnerability affecting versions 11.10 through 18.11.3 that allowed unauthenticated users to create unauthorized Jira subscriptions due to a missing CSRF protection flaw.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-4527 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-4527.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2026-4527"
},
{
"cve": "CVE-2026-1659",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "GitLab addressed a denial of service vulnerability affecting GitLab CE/EE versions 9.0 through 18.11.3, exploitable by unauthenticated users via specially crafted requests due to insufficient input validation.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-1659 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-1659.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2026-1659"
},
{
"cve": "CVE-2026-1338",
"cwe": {
"id": "CWE-639",
"name": "Authorization Bypass Through User-Controlled Key"
},
"notes": [
{
"category": "other",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
},
{
"category": "description",
"text": "GitLab addressed a security flaw in versions prior to 18.9.7, 18.10.6, and 18.11.3 where authenticated users with developer permissions could delete protected container registry tags due to improper authorization checks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-1338 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-1338.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2026-1338"
},
{
"cve": "CVE-2026-7471",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "description",
"text": "GitLab addressed a security vulnerability in specific GitLab EE versions where authenticated users with control over a virtual registry upstream could send unauthorized requests to internal hosts due to improper validation.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-7471 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-7471.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2026-7471"
},
{
"cve": "CVE-2026-6883",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "other",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "description",
"text": "GitLab fixed a vulnerability in multiple Enterprise Edition versions that allowed authenticated users to bypass merge request approval requirements due to improper cleanup of orphaned policy records.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-6883 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-6883.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2026-6883"
},
{
"cve": "CVE-2026-3074",
"cwe": {
"id": "CWE-639",
"name": "Authorization Bypass Through User-Controlled Key"
},
"notes": [
{
"category": "other",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
},
{
"category": "description",
"text": "GitLab addressed a security flaw in versions 16.7 to before 18.9.7, 18.10 to before 18.10.6, and 18.11 to before 18.11.3 that allowed unauthenticated users to download private debugging symbols from restricted projects due to improper access control.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-3074 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-3074.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2026-3074"
},
{
"cve": "CVE-2026-7377",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "description",
"text": "GitLab EE versions contained a security flaw allowing authenticated users to execute arbitrary JavaScript in other users\u0027 browsers via customizable analytics dashboards due to improper input sanitization.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-7377 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-7377.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2026-7377"
},
{
"cve": "CVE-2026-8280",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "GitLab versions 8.3 through before 18.9.7, 18.10 before 18.10.6, and 18.11 before 18.11.3 contained a vulnerability allowing authenticated users to cause denial of service via excessive memory use due to improper input validation.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-8280 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-8280.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2026-8280"
},
{
"cve": "CVE-2026-4524",
"cwe": {
"id": "CWE-288",
"name": "Authentication Bypass Using an Alternate Path or Channel"
},
"notes": [
{
"category": "other",
"text": "Authentication Bypass Using an Alternate Path or Channel",
"title": "CWE-288"
},
{
"category": "description",
"text": "GitLab versions 18.9.1 to before 18.9.7, 18.10 to before 18.10.6, and 18.11 to before 18.11.3 contained a security flaw allowing authenticated users to access confidential issue content in public projects due to improper authorization checks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-4524 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-4524.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2026-4524"
},
{
"cve": "CVE-2026-8144",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "other",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "description",
"text": "GitLab addressed a security vulnerability in versions 15.1 to before 18.9.7, 18.10 to before 18.10.6, and 18.11 to before 18.11.3 that allowed authenticated project members to enumerate private group members due to missing authorization checks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-8144 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-8144.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2026-8144"
},
{
"cve": "CVE-2026-1184",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "description",
"text": "GitLab addressed a denial of service vulnerability in certain GitLab EE versions caused by improper validation of specially crafted file uploads allowing unauthenticated users to disrupt service.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-1184 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-1184.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2026-1184"
},
{
"cve": "CVE-2026-1322",
"notes": [
{
"category": "description",
"text": "GitLab addressed a security vulnerability in versions 16.0 to before 18.9.7, 18.10 to before 18.10.6, and 18.11 to before 18.11.3 that allowed authenticated users with read_api scoped OAuth tokens to improperly create and comment on issues in private projects.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-1322 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-1322.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2026-1322"
},
{
"cve": "CVE-2026-7481",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "description",
"text": "GitLab addressed a security flaw in multiple GitLab EE versions that allowed authenticated developers to execute arbitrary JavaScript in other users\u0027 browsers due to improper input sanitization.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-7481 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-7481.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2026-7481"
},
{
"cve": "CVE-2026-6335",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "description",
"text": "GitLab versions 18.11 to before 18.11.3 contained a vulnerability allowing authenticated users to execute arbitrary code in other users\u0027 browser sessions due to improper input sanitization.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-6335 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-6335.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2026-6335"
},
{
"cve": "CVE-2026-3073",
"cwe": {
"id": "CWE-639",
"name": "Authorization Bypass Through User-Controlled Key"
},
"notes": [
{
"category": "other",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
},
{
"category": "description",
"text": "GitLab addressed a security flaw in versions 17.6 to before 18.9.7, 18.10 to before 18.10.6, and 18.11 to before 18.11.3 that allowed authenticated developers to bypass PyPI package restrictions due to improper authorization checks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-3073 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-3073.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2026-3073"
},
{
"cve": "CVE-2025-12669",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "description",
"text": "GitLab addressed a vulnerability in multiple versions that allowed authenticated users to inject HTML and JavaScript into email notifications due to improper input sanitization.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-12669 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-12669.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2025-12669"
},
{
"cve": "CVE-2026-6073",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "description",
"text": "GitLab addressed a security flaw in specific GitLab EE versions where authenticated users could execute arbitrary JavaScript in other users\u0027 browsers due to insufficient input sanitization.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-6073 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-6073.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2026-6073"
},
{
"cve": "CVE-2026-2900",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "other",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "description",
"text": "GitLab fixed a security vulnerability in GitLab EE versions before 18.9.7, 18.10.6, and 18.11.3 where Maintainers could bypass instance-level approval rule editing restrictions due to missing authorization checks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-2900 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-2900.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2026-2900"
},
{
"cve": "CVE-2026-6063",
"cwe": {
"id": "CWE-639",
"name": "Authorization Bypass Through User-Controlled Key"
},
"notes": [
{
"category": "other",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
},
{
"category": "description",
"text": "GitLab addressed a security vulnerability in specific versions where authenticated users with developer permissions could bypass access controls to remove code owner approval rules from merge requests.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-6063 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-6063.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2026-6063"
},
{
"cve": "CVE-2025-13874",
"cwe": {
"id": "CWE-639",
"name": "Authorization Bypass Through User-Controlled Key"
},
"notes": [
{
"category": "other",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
},
{
"category": "description",
"text": "GitLab addressed a security vulnerability in versions 15.1 to before 18.9.7, 18.10 to before 18.10.6, and 18.11 to before 18.11.3 that permitted authenticated users with Guest permissions to access unauthorized project issues.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-13874 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-13874.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2025-13874"
},
{
"cve": "CVE-2026-3607",
"cwe": {
"id": "CWE-1280",
"name": "Access Control Check Implemented After Asset is Accessed"
},
"notes": [
{
"category": "other",
"text": "Access Control Check Implemented After Asset is Accessed",
"title": "CWE-1280"
},
{
"category": "description",
"text": "GitLab addressed a security vulnerability in versions 18.3 to before 18.9.7, 18.10 to before 18.10.6, and 18.11 to before 18.11.3 that allowed authenticated users with developer roles to bypass package protection rules due to improper access control.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-3607 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-3607.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2026-3607"
},
{
"cve": "CVE-2025-14870",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "GitLab addressed a denial of service vulnerability caused by insufficient input validation in versions 18.5 to before 18.9.7, 18.10 to before 18.10.6, and 18.11 to before 18.11.3, exploitable via crafted JSON payloads by unauthenticated users.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-14870 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-14870.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2025-14870"
},
{
"cve": "CVE-2025-14869",
"cwe": {
"id": "CWE-1284",
"name": "Improper Validation of Specified Quantity in Input"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Specified Quantity in Input",
"title": "CWE-1284"
},
{
"category": "description",
"text": "GitLab addressed a denial of service vulnerability affecting versions 18.5 to before 18.9.7, 18.10 to before 18.10.6, and 18.11 to before 18.11.3, exploitable via specially crafted API payloads by unauthenticated users.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-14869 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-14869.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2025-14869"
},
{
"cve": "CVE-2026-5297",
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-5297 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-5297.json"
}
],
"title": "CVE-2026-5297"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.