GitLab has released emergency patches for versions 18.11.3, 18.10.6, and 18.9.7, addressing critical vulnerabilities in its CI/CD pipeline. These vulnerabilities exposed sensitive project data and allowed for authentication bypass and arbitrary code execution.
Overview
The patches fix multiple security issues, including Cross-site Scripting (XSS) vulnerabilities, Denial of Service (DoS) issues, and Improper Access Control problems. The affected versions are all versions from 15.1 to 18.11.3 for GitLab CE/EE.
Security Fixes
The security fixes include:
- CVE-2026-7481: Cross-site Scripting issue in Analytics dashboard chart rendering
- CVE-2026-5297: Cross-site Scripting issue in global search
- CVE-2026-6073: Cross-site Scripting issue in Duo Agent output rendering
- CVE-2026-7377: Cross-site Scripting issue in Analytics Dashboard
- CVE-2026-1659: Denial of Service issue in CI/CD job update API
- CVE-2025-14870: Denial of Service issue in Duo Workflows API
- CVE-2025-14869: Denial of Service issue in internal API endpoints
- CVE-2026-1322: Improper Authorization issue in GraphQL token scope enforcement
- CVE-2026-1184: Denial of Service issue in Insights Configuration
- CVE-2026-4524: Access Control issue in Issues API
- CVE-2026-8280: Denial of Service issue in direct transfer CSV parser
- CVE-2026-4527: CSRF issue in JiraConnect subscriptions
- CVE-2026-3160: Confused Deputy issue in Jira integration
- CVE-2026-6335: Cross-site Scripting issue in Banzai markdown sanitizer
- CVE-2025-12669: Cross-site Scripting issue in achievement email notifications
- CVE-2026-3607: Access Control issue in Helm package upload
- CVE-2026-3074: Improper Access Control issue in NuGet Symbol Server
- CVE-2026-1338: Improper Access Control issue in Container Registry protected tags
- CVE-2026-6063: Improper Access Control issue in code owner approval rules
- CVE-2026-3073: Access Control issue in PyPI Package Protection Rules
- CVE-2025-13874: Improper Access Control issue in issue links API
- CVE-2026-7471: Server-Side Request Forgery issue in virtual registry redirect handler
- CVE-2026-2900: Access Control issue in GraphQL approval rule mutations
- CVE-2026-6883: Missing Authorization issue in Security Policy Project Reassignment
Updating
To update GitLab, see the Update page. To update GitLab Runner, see the Updating the Runner page. It is highly recommended that all customers upgrade to the latest patch release for their supported version to maintain good security hygiene.
GitLab has also included bug fixes in the patches, including performance optimizations and fixes for issues with milestone removal, groups dashboard, and security MR widgets.
In conclusion, the emergency patches released by GitLab address critical vulnerabilities that could have exposed sensitive project data and allowed for authentication bypass and arbitrary code execution. It is essential for users to update their GitLab installations to the latest patch release to ensure the security and integrity of their data.