Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
Upgrade to versions 18.8.7, 18.9.3, 18.10.1 or above.
Workaround
No workaround given by the vendor.
Wed, 25 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 25 Mar 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 7.11 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to bypass WebAuthn two-factor authentication and gain unauthorized access to user accounts due to inconsistent input validation in the authentication process. | |
| Title | Authentication Bypass Using an Alternate Path or Channel in GitLab | |
| First Time appeared |
Gitlab
Gitlab gitlab |
|
| Weaknesses | CWE-288 | |
| CPEs | cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Gitlab
Gitlab gitlab |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitLab
Published:
Updated: 2026-03-26T03:55:31.559Z
Reserved: 2026-02-19T13:36:18.700Z
Link: CVE-2026-2745
Updated: 2026-03-25T17:10:16.256Z
Status : Received
Published: 2026-03-25T17:16:57.803
Modified: 2026-03-25T17:16:57.803
Link: CVE-2026-2745
No data.
OpenCVE Enrichment
Updated: 2026-03-26T11:34:32Z