GitLab Issues Urgent Security Advisory for Multiple Versions

GitLab has issued a critical security advisory for multiple versions of its software, urging users to update to the latest patched versions to mitigate high-severity vulnerabilities.

VulnerabilitiesHIGHUpdated: Published: πŸ“° 5 sources

Original Reporting

CCCanadian Cyber Centre Alerts

AI Summary

CyberPings AIΒ·Reviewed by Rohit Rana

🎯GitLab found some serious problems in its software that could let bad guys sneak in or cause crashes. They fixed these issues and released new versions. If you use GitLab, you need to update to stay safe!

What Happened

On March 11, 2026, GitLab released a critical security advisory to inform users about vulnerabilities in its software. This advisory affects both the Community Edition (CE) and Enterprise Edition (EE) of GitLab. Specifically, versions prior to 18.10.3, 18.9.5, 18.8.9, 18.9.2, 18.8.6, and 18.7.6 are at risk. Additionally, a subsequent advisory published on April 22, 2026, extends the affected versions to include those prior to 18.11.1, 18.10.4, and 18.9.6.

The vulnerabilities could potentially expose sensitive data or allow unauthorized access. GitLab is urging all users and administrators to take immediate action by updating to the latest patched versions. The new releases include 18.10.3, 18.9.5, 18.8.9, as well as the more recent updates: 18.11.1, 18.10.4, and 18.9.6, which address these security issues directly.

High-Severity Vulnerabilities

The latest security updates resolve three high-severity bugs:

  • CVE-2026-5173 (CVSS 8.5): An authenticated attacker could execute unintended server-side commands through WebSocket connections due to improper access controls.
  • CVE-2026-1092 (CVSS 7.5): An unauthenticated user could trigger a Denial of Service attack by submitting improperly validated JSON data to the Terraform state lock API.
  • CVE-2025-12664 (CVSS 7.5): Attackers without an account could cause a DoS condition by overwhelming the server with repeated GraphQL queries.

Additionally, several medium-level vulnerabilities were addressed, including:

  • CVE-2026-1516 (CVSS 5.7): An authenticated user could inject malicious code into Code Quality reports, leaking the IP addresses of other users.
  • CVE-2026-1403 (CVSS 6.5): Weak validation of CSV files could allow authenticated users to crash background Sidekiq workers during file import.

New Features in GitLab 18.11

In conjunction with the security advisory, GitLab has also launched GitLab 18.11, which introduces agentic AI features aimed at enhancing security remediation and improving CI pipelines. This update includes:

⚠️

Agentic SAST Vulnerability Resolution

Now available for GitLab Ultimate customers, this feature automates the process of analyzing vulnerabilities and generating code fixes, allowing developers to address issues proactively before they reach production.

πŸ”“

New Agents for CI and Analytics

The CI Expert Agent and Data Analyst Agent help streamline pipeline configuration and provide insights into software lifecycle data, making it easier for teams to manage their development processes effectively.

Why Should You Care

If you're using GitLab, this advisory is crucial for your security. Ignoring these updates could leave your projects vulnerable to attacks. Think of it like leaving your front door unlocked; you wouldn't want anyone to just walk in.

By keeping your software updated, you protect not only your own data but also the data of your collaborators. In today's digital age, where breaches can lead to severe consequences, ensuring your tools are secure is essential. Don't wait for a breach to happen; update your GitLab versions now!

What's Being Done

GitLab has already released patches to fix the identified vulnerabilities. Here’s what you should do right now:

  • Update to the latest versions: 18.11.1, 18.10.4, 18.9.6, 18.10.3, 18.9.5, or 18.8.9.
  • Review the security advisory for detailed information on the vulnerabilities.
  • Encourage your team to stay informed about future updates.

Experts are closely monitoring the situation to ensure no new exploits arise from these vulnerabilities. Users hosted on GitLab.com or using GitLab Dedicated are already safe, as the company has applied the patches to its cloud servers. Stay vigilant and keep your software updated.

πŸ”’ Pro Insight

With the recent updates, GitLab is not only addressing critical vulnerabilities but also enhancing its platform with AI-driven features for better security management. Users must prioritize these updates to safeguard their projects.

πŸ“… Story Timeline

Story broke by Canadian Cyber Centre Alerts

Covered by AusCERT Bulletins

Covered by Canadian Cyber Centre Alerts

Covered by Cyber Security News

Covered by Help Net Security

Related Pings