Metrics
Affected Vendors & Products
No advisories yet.
Solution
Upgrade to versions 18.4.6, 18.5.4, 18.6.2 or above.
Workaround
No workaround given by the vendor.
Thu, 11 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 11 Dec 2025 04:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 13.1 before 18.4.6, 18.5 before 18.5.4, and 18.6 before 18.6.2 that could have allowed an authenticated user to bypass WebAuthn two-factor authentication by manipulating the session state under certain conditions. | |
| Title | Authentication Bypass Using an Alternate Path or Channel in GitLab | |
| First Time appeared |
Gitlab
Gitlab gitlab |
|
| Weaknesses | CWE-288 | |
| CPEs | cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Gitlab
Gitlab gitlab |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitLab
Published:
Updated: 2025-12-12T04:55:46.938Z
Reserved: 2025-10-20T18:33:40.909Z
Link: CVE-2025-11984
Updated: 2025-12-11T15:16:00.731Z
Status : Awaiting Analysis
Published: 2025-12-11T05:16:36.970
Modified: 2025-12-12T15:18:13.390
Link: CVE-2025-11984
No data.
OpenCVE Enrichment
No data.