BIT-gitlab-2026-0723

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/gitlab/BIT-gitlab-2026-0723.json
JSON Data
https://api.osv.dev/v1/vulns/BIT-gitlab-2026-0723
Aliases
Published
2026-01-27T09:13:22.812Z
Modified
2026-01-27T09:41:18.761747Z
Summary
Unchecked Return Value in GitLab
Details

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.6 before 18.6.4, 18.7 before 18.7.2, and 18.8 before 18.8.2 that could have allowed an individual with existing knowledge of a victim's credential ID to bypass two-factor authentication by submitting forged device responses.

Database specific
{
    "severity": "High",
    "cpes": [
        "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
        "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
    ]
}
References

Affected packages

Bitnami / gitlab

Package

Name
gitlab
Purl
pkg:bitnami/gitlab

Severity

  • 7.4 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
18.6.0
Fixed
18.6.4
Introduced
18.7.0
Fixed
18.7.2
Introduced
18.8.0
Fixed
18.8.2

Database specific

source
"https://github.com/bitnami/vulndb/tree/main/data/gitlab/BIT-gitlab-2026-0723.json"