Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
Upgrade to versions 18.6.4, 18.7.2, 18.8.2 or above.
Workaround
No workaround given by the vendor.
Mon, 26 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:* cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:* |
Thu, 22 Jan 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 22 Jan 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.6 before 18.6.4, 18.7 before 18.7.2, and 18.8 before 18.8.2 that could have allowed an individual with existing knowledge of a victim's credential ID to bypass two-factor authentication by submitting forged device responses. | |
| Title | Unchecked Return Value in GitLab | |
| First Time appeared |
Gitlab
Gitlab gitlab |
|
| Weaknesses | CWE-252 | |
| CPEs | cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Gitlab
Gitlab gitlab |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitLab
Published:
Updated: 2026-02-26T14:44:33.144Z
Reserved: 2026-01-08T13:03:57.347Z
Link: CVE-2026-0723
Updated: 2026-01-22T15:28:44.448Z
Status : Analyzed
Published: 2026-01-22T15:16:50.030
Modified: 2026-01-26T21:06:04.117
Link: CVE-2026-0723
No data.
OpenCVE Enrichment
No data.