Description
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 14.4 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an authenticated user with group import permissions to create labels in private projects due to improper authorization validation in the group import process under certain circumstances.
Published: 2026-03-11
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Label Creation
Action: Apply Patch
AI Analysis

Impact

GitLab’s group import process contains an improper authorization validation flaw that can allow an authenticated user who possesses group import permissions to create labels in private projects. This missing authorization (CWE‑862) results in the ability to alter project metadata without proper consent, but does not provide additional powers such as code execution, data exfiltration, or privilege escalation. The effect is limited to the creation of unauthorized labels, which could be used to obscure malicious activity or facilitate social engineering within a private project.

Affected Systems

All installations of GitLab Community Edition and Enterprise Edition are affected when they include the group import functionality and are running a version that falls within one of the following ranges: from version 14.4 up to but not including 18.7.6, from 18.8 up to but not including 18.8.6, or from 18.9 up to but not including 18.9.2. Any deployment that has at least one user with group import permissions and is within these version ranges is therefore vulnerable.

Risk and Exploitability

The vulnerability carries a CVSS base score of 4.3, indicating a low to moderate severity level. The EPSS score is below 1%, suggesting that exploitation is unlikely to be widespread. It is not listed in the CISA KEV catalog. Exploitation requires an authenticated user with existing group import permissions; no additional external access or preconditions are required. The attack vector is authenticated and confined to the boundaries of the user’s import rights, which limits the potential impact to label creation within private projects.

Generated by OpenCVE AI on March 17, 2026 at 16:32 UTC.

Remediation

Vendor Solution

Upgrade to versions 18.7.6, 18.8.6, 18.9.2 or above.


OpenCVE Recommended Actions

  • Upgrade to GitLab version 18.7.6, 18.8.6, 18.9.2 or later

Generated by OpenCVE AI on March 17, 2026 at 16:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 13 Mar 2026 13:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*

Thu, 12 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Description GitLab has remediated an issue in GitLab CE/EE affecting all versions from 14.4 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an authenticated user with group import permissions to create labels in private projects due to improper authorization validation in the group import process under certain circumstances.
Title Missing Authorization in GitLab
First Time appeared Gitlab
Gitlab gitlab
Weaknesses CWE-862
CPEs cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*
Vendors & Products Gitlab
Gitlab gitlab
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitLab

Published:

Updated: 2026-03-12T16:15:41.091Z

Reserved: 2026-01-29T20:33:21.256Z

Link: CVE-2026-1663

cve-icon Vulnrichment

Updated: 2026-03-12T16:15:35.704Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-11T16:16:22.833

Modified: 2026-03-13T13:24:07.457

Link: CVE-2026-1663

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:30:49Z

Weaknesses