Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
Upgrade to versions 18.6.6, 18.7.4, 18.8.4 or above.
Workaround
No workaround given by the vendor.
Fri, 13 Feb 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:* cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:* |
Wed, 11 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Feb 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.0 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 that, under certain conditions, could have allowed an authenticated user to perform server-side request forgery against internal services by bypassing protections in the Git repository import functionality. | |
| Title | Server-Side Request Forgery (SSRF) in GitLab | |
| First Time appeared |
Gitlab
Gitlab gitlab |
|
| Weaknesses | CWE-918 | |
| CPEs | cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Gitlab
Gitlab gitlab |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitLab
Published:
Updated: 2026-02-11T15:14:53.506Z
Reserved: 2025-10-22T14:08:16.388Z
Link: CVE-2025-12073
Updated: 2026-02-11T15:14:49.688Z
Status : Analyzed
Published: 2026-02-11T12:16:02.653
Modified: 2026-02-13T15:15:12.320
Link: CVE-2025-12073
No data.
OpenCVE Enrichment
Updated: 2026-02-11T21:45:40Z