Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
GitLab Urges Update to Fix Critical Security Flaws

GitLab Urges Update to Fix Critical Security Flaws

Posted on April 9, 2026 By CWS

GitLab has announced the release of crucial security updates for its Community Edition (CE) and Enterprise Edition (EE), urging all users to upgrade immediately to address several critical vulnerabilities. These updates, available in versions 18.10.3, 18.9.5, and 18.8.9, are essential to safeguard systems from potential Denial-of-Service (DoS) and code injection attacks.

Critical Vulnerabilities Addressed

The security patches resolve three high-severity vulnerabilities that pose significant risks to GitLab users. The first, identified as CVE-2026-5173 with a CVSS score of 8.5, allows authenticated attackers to execute unauthorized server-side commands via WebSocket connections due to inadequate access controls. Another, CVE-2026-1092 (CVSS 7.5), enables unauthenticated users to initiate a DoS attack by submitting improperly validated JSON data to the Terraform state lock API. Additionally, CVE-2025-12664 (CVSS 7.5) permits attackers without accounts to trigger a DoS condition by overwhelming the server with repeated GraphQL queries.

Medium-Severity Vulnerabilities

In addition to high-severity issues, GitLab has also addressed several medium-level vulnerabilities. These include CVE-2026-1516 (CVSS 5.7), where authenticated users could inject malicious code into Code Quality reports, exposing the IP addresses of others viewing the report. CVE-2026-1403 (CVSS 6.5) highlights weak CSV file validation, allowing users to crash background Sidekiq workers during file import. Furthermore, CVE-2026-4332 (CVSS 5.4) involves inadequate input filtering in analytics dashboards, enabling attackers to execute harmful JavaScript code in other users’ browsers. Lastly, CVE-2026-1101 (CVSS 6.5) points to poor input validation in GraphQL queries, allowing authenticated users to cause a DoS of the entire GitLab instance.

Additional Security Improvements

GitLab’s update also incorporates several lower-severity patches addressing data leaks and access control issues. For instance, CVE-2026-2619 (CVSS 4.3) allowed authenticated users with auditor privileges to modify vulnerability flag data in private projects. CVE-2025-9484 (CVSS 4.3) involved an information disclosure bug that permitted users to view others’ email addresses through specific GraphQL queries. Additionally, CVE-2026-1752 (CVSS 4.3) allowed developers to alter protected environment settings due to improper access controls, while CVE-2026-2104 (CVSS 4.3) and CVE-2026-4916 (CVSS 2.7) involved insufficient authorization checks in CSV exports and custom role management, respectively.

GitLab emphasizes the immediate need for all self-managed installations to upgrade to the specified versions. The updates, which do not necessitate complex database changes, can be applied to multi-node deployments without causing system downtime. Users hosted on GitLab.com or using GitLab Dedicated are already protected, as the company has implemented these patches on its cloud servers.

Stay informed about the latest cybersecurity developments by following us on Google News, LinkedIn, and X. Reach out to us to feature your stories.

Cyber Security News Tags:code injection, CVSS, Cybersecurity, DoS attack, GitLab, high-severity flaws, security update, self-managed systems, software update, Vulnerabilities

Post navigation

Previous Post: STX RAT Emerges as a Stealthy Cyber Threat
Next Post: Urgent SonicWall Patch Released for Critical Vulnerabilities

Related Posts

GitLab High-Severity Vulnerabilities Let Attackers Crash Instances GitLab High-Severity Vulnerabilities Let Attackers Crash Instances Cyber Security News
CISA Warns of CitrixBleed 2 Vulnerability Exploited in Attacks CISA Warns of CitrixBleed 2 Vulnerability Exploited in Attacks Cyber Security News
Hackers Leverage GitHub Notifications to Mimic as Y Combinator to Steal Funds from Wallets Hackers Leverage GitHub Notifications to Mimic as Y Combinator to Steal Funds from Wallets Cyber Security News
Threat Actors Leveraging Open-Source AdaptixC2 in Real-World Attacks Threat Actors Leveraging Open-Source AdaptixC2 in Real-World Attacks Cyber Security News
VMware Tools and Aria 0-Day Vulnerability Exploited for Privilege Escalation and Code Execution VMware Tools and Aria 0-Day Vulnerability Exploited for Privilege Escalation and Code Execution Cyber Security News
Hackers Exploiting RMM Tools LogMeIn and PDQ Connect to Deploy Malware as a Normal Program Hackers Exploiting RMM Tools LogMeIn and PDQ Connect to Deploy Malware as a Normal Program Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Phishing Tactic Utilizes Google Cloud for Remcos RAT
  • Critical Update Issued for Palo Alto Cortex Vulnerability
  • EngageLab SDK Vulnerability Risks Millions of Android Users
  • Urgent SonicWall Patch Released for Critical Vulnerabilities
  • GitLab Urges Update to Fix Critical Security Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Phishing Tactic Utilizes Google Cloud for Remcos RAT
  • Critical Update Issued for Palo Alto Cortex Vulnerability
  • EngageLab SDK Vulnerability Risks Millions of Android Users
  • Urgent SonicWall Patch Released for Critical Vulnerabilities
  • GitLab Urges Update to Fix Critical Security Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark