Description
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.2 before 18.8.9, 18.9 before 18.9.5, and 18.10 before 18.10.3 that could have allowed an authenticated user with custom role permissions to demote or remove higher-privileged group members due to improper authorization checks on member management operations.
Published: 2026-04-08
Score: 2.7 Low
EPSS: n/a
KEV: No
Impact: Unauthorized Privilege Escalation
Action: Immediate Patch
AI Analysis

Impact

GitLab contains an improper authorization check in the member management API that allows an authenticated user with a custom role granting member‑management permissions to demote or remove higher‑privileged group members. The flaw does not provide code execution or direct data access; it solely permits unauthorized modification of user privileges within a group, effectively enabling privilege escalation or weakening of existing access controls.

Affected Systems

All GitLab Community Edition and Enterprise Edition releases from version 18.2 up to but not including 18.8.9, from 18.9 up to but not including 18.9.5, and from 18.10 up to but not including 18.10.3 are affected. The issue is specific to these GitLab deployments and does not apply to later patched releases.

Risk and Exploitability

The CVSS score of 2.7 indicates low severity. No publicly reported exploitation activity has been documented, and the vulnerability is not included in the CISA Known Exploited Vulnerabilities catalog. Exploitation requires authentication and possession of a custom role with member‑management permissions, which may be available to insiders or compromised accounts. While the attack path is straightforward for a user with the necessary permissions, the overall risk remains limited compared to higher‑impact vulnerabilities.

Generated by OpenCVE AI on April 8, 2026 at 23:52 UTC.

Remediation

Vendor Solution

Upgrade to versions 18.8.9, 18.9.5, 18.10.3 or above.


OpenCVE Recommended Actions

  • Apply the vendor‑recommended patch to GitLab 18.8.9, 18.9.5, 18.10.3 or newer
  • Verify that the patch applied successfully and that member management privileges are enforced correctly
  • Review any custom role configurations to ensure they do not grant unintended member‑management rights

Generated by OpenCVE AI on April 8, 2026 at 23:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 22:45:00 +0000

Type Values Removed Values Added
Description GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.2 before 18.8.9, 18.9 before 18.9.5, and 18.10 before 18.10.3 that could have allowed an authenticated user with custom role permissions to demote or remove higher-privileged group members due to improper authorization checks on member management operations.
Title Missing Authorization in GitLab
First Time appeared Gitlab
Gitlab gitlab
Weaknesses CWE-862
CPEs cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*
Vendors & Products Gitlab
Gitlab gitlab
References
Metrics cvssV3_1

{'score': 2.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitLab

Published:

Updated: 2026-04-08T22:25:22.837Z

Reserved: 2026-03-26T17:33:30.367Z

Link: CVE-2026-4916

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-08T23:17:00.053

Modified: 2026-04-08T23:17:00.053

Link: CVE-2026-4916

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-09T08:25:41Z

Weaknesses