Urgent Alert: GitLab Issues Critical Security Updates to Combat DoS and Code Injection Threats
GitLab has released urgent security updates (versions 18.10.3, 18.9.5, and 18.8.9) for its Community Edition (CE) and Enterprise Edition (EE). These critical GitLab security updates address high-severity flaws that could enable Denial-of-Service (DoS) and code-injection attacks.
GitLab strongly advises all administrators of self-managed systems to upgrade immediately to protect their instances from these significant vulnerabilities. Applying these GitLab security updates is paramount for maintaining system integrity.
High-Severity Vulnerabilities Addressed in GitLab Security Updates
The latest security release resolves three high-severity bugs that pose significant risks to GitLab environments:
- CVE-2026-5173 (CVSS 8.5): An authenticated attacker could execute unintended server-side commands through WebSocket connections due to improper access controls. This vulnerability highlights the importance of timely GitLab security updates.
- CVE-2026-1092 (CVSS 7.5): An unauthenticated user could trigger a Denial of Service attack by submitting improperly validated JSON data to the Terraform state lock API.
- CVE-2025-12664 (CVSS 7.5): Attackers without an account could cause a DoS condition by overwhelming the server with repeated GraphQL queries.
Medium-Level Vulnerabilities Patched
Alongside the severe issues, GitLab also addressed several medium-level vulnerabilities that could compromise user safety and system stability:
- CVE-2026-1516 (CVSS 5.7): An authenticated user could inject malicious code into Code Quality reports, secretly leaking the IP addresses of other users who view the report.
- CVE-2026-1403 (CVSS 6.5): Weak validation of CSV files could allow authenticated users to crash background Sidekiq workers during file import.
- CVE-2026-4332 (CVSS 5.4): Poor input filtering in analytics dashboards could allow attackers to execute harmful JavaScript code in the browsers of other users.
- CVE-2026-1101 (CVSS 6.5): Bad input validation in GraphQL queries could allow an authenticated user to cause a DoS of the entire GitLab instance.
Additional Security Patches and Lower-Severity Fixes
The update also includes several lower-severity patches that resolve data leaks and broken access controls, further enhancing overall GitLab security:
- CVE-2026-2619 (CVSS 4.3): Incorrect authorization allowed authenticated users with auditor privileges to modify vulnerability flag data in private projects.
- CVE-2025-9484 (CVSS 4.3): An information disclosure bug allowed authenticated users to view other users’ email addresses through specific GraphQL queries.
- CVE-2026-1752 (CVSS 4.3): Improper access controls allowed developers to modify protected environment settings.
- CVE-2026-2104 (CVSS 4.3): Insufficient authorization checks in CSV exports allowed users to access confidential issues assigned to others.
- CVE-2026-4916 (CVSS 2.7): A missing authorization check allows users with custom roles to demote or remove higher-privileged group members.
GitLab emphasizes that all self-managed installations must be upgraded to versions 18.10.3, 18.9.5, or 18.8.9 as soon as possible. These GitLab security updates are crucial for enterprise environments.
Because these updates do not require complex database changes, multi-node deployments can be upgraded without any system downtime. Users hosted on GitLab.com or using GitLab Dedicated are already safe, as the company has applied the patches to its cloud servers.
