Description
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 10.6 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an authenticated user, when the `markdown_placeholders` feature flag was enabled, to inject JavaScript in a browser due to improper sanitization of placeholder content in markdown processing.
Published: 2026-03-11
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑site Scripting
Action: Immediate Patch
AI Analysis

Impact

An authenticated user can inject arbitrary JavaScript into any web page rendered by GitLab when the markdown_placeholders feature flag is enabled. The vulnerability is a result of improper sanitization of placeholder content inside Markdown processing, leading to a classic Reflected Cross‑Site Scripting (XSS) flaw. An attacker who gains access to a GitLab account could use this injection to execute arbitrary scripts in the victim's browser, potentially compromising personal credentials, session tokens, or other sensitive data visible to the user.

Affected Systems

The flaw affects GitLab Community Edition (CE) and Enterprise Edition (EE) from early releases starting at 10.6 up to, but not including, 18.7.6, all 18.8 releases before 18.8.6, and all 18.9 releases before 18.9.2. The affected product is identified by the CPE entries provided for GitLab.

Risk and Exploitability

The CVSS score of 8.7 indicates a high severity level (High). The EPSS score is less than 1%, suggesting that the probability of exploitation is low. The vulnerability is not listed in the CISA KEV catalog, meaning it has not been tied to known, widespread exploitation campaigns. Exploitation requires the attacker to be an authenticated user with an enabled markdown_placeholders flag. Because the attack vector is a typical web interface action performed through a browser, the threat surface is limited to users with valid credentials and the feature flag set.

Generated by OpenCVE AI on March 17, 2026 at 14:56 UTC.

Remediation

Vendor Solution

Upgrade to versions 18.7.6, 18.8.6, 18.9.2 or above.


OpenCVE Recommended Actions

  • Upgrade to GitLab version 18.7.6 or later, 18.8.6 or later, or 18.9.2 or later.

Generated by OpenCVE AI on March 17, 2026 at 14:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 13 Mar 2026 12:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*

Thu, 12 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Description GitLab has remediated an issue in GitLab CE/EE affecting all versions from 10.6 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an authenticated user, when the `markdown_placeholders` feature flag was enabled, to inject JavaScript in a browser due to improper sanitization of placeholder content in markdown processing.
Title Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab
First Time appeared Gitlab
Gitlab gitlab
Weaknesses CWE-79
CPEs cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*
Vendors & Products Gitlab
Gitlab gitlab
References
Metrics cvssV3_1

{'score': 8.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitLab

Published:

Updated: 2026-03-12T13:32:23.694Z

Reserved: 2026-01-16T21:03:59.336Z

Link: CVE-2026-1090

cve-icon Vulnrichment

Updated: 2026-03-11T19:44:22.120Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-11T16:16:22.340

Modified: 2026-03-13T12:36:26.963

Link: CVE-2026-1090

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:30:47Z

Weaknesses