Description
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 11.10 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an authenticated user to perform unauthorized actions on merge requests in other projects due to improper access control during cross-repository operations.
Published: 2026-03-25
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation on Merge Requests
Action: Apply Patch
AI Analysis

Impact

GitLab has identified a flaw in its access control logic that permits authenticated users to carry out unauthorized actions on merge requests belonging to projects where they lack proper permissions. This vulnerability could let an attacker approve, rebase, modify, or merge requests, thereby compromising the integrity and stability of the codebase.

Affected Systems

All GitLab Community and Enterprise Edition releases from version 11.10 up to 18.10.0 are vulnerable. Specifically, any build before 18.8.7, before 18.9.3 in the 18.9 series, or before 18.10.1 in the 18.10 series is affected.

Risk and Exploitability

The CVSS score of 4.3 indicates moderate severity, while the EPSS score of less than 1% suggests a low likelihood of widespread exploitation in the near term. The vulnerability requires an authenticated GitLab user to initiate cross‑repository merge request operations; based on the description, the likely attack vector is an authenticated user exploiting this flaw. The issue is not listed in the CISA KEV catalog, implying it has not yet been widely exploited. Nevertheless, organizations should address the flaw promptly to prevent potential misuse of merge request privileges.

Generated by OpenCVE AI on March 26, 2026 at 19:26 UTC.

Remediation

Vendor Solution

Upgrade to versions 18.8.7, 18.9.3, 18.10.1 or above.


OpenCVE Recommended Actions

  • Upgrade to GitLab 18.8.7, 18.9.3, 18.10.1, or later as recommended by the vendor.
  • Verify that the installed version meets the upgrade requirement.
  • Restart GitLab to apply the upgrade.
  • Review merge request logs for anomalous activity that might have occurred while the system was vulnerable.
  • Stay alert for additional advisories or patch releases related to this issue.

Generated by OpenCVE AI on March 26, 2026 at 19:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 18:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:18.10.0:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:18.10.0:*:*:*:enterprise:*:*:*

Wed, 25 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Description GitLab has remediated an issue in GitLab CE/EE affecting all versions from 11.10 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an authenticated user to perform unauthorized actions on merge requests in other projects due to improper access control during cross-repository operations.
Title Incorrect Authorization in GitLab
First Time appeared Gitlab
Gitlab gitlab
Weaknesses CWE-863
CPEs cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*
Vendors & Products Gitlab
Gitlab gitlab
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitLab

Published:

Updated: 2026-03-25T17:14:34.612Z

Reserved: 2026-02-18T22:03:54.593Z

Link: CVE-2026-2726

cve-icon Vulnrichment

Updated: 2026-03-25T17:14:32.340Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-25T17:16:57.640

Modified: 2026-03-26T18:30:16.080

Link: CVE-2026-2726

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:30:25Z

Weaknesses