Improper Access Control in GitLab Affects Multiple Versions
CVE-2026-5173

8.5HIGH

Key Information:

Vendor

Gitlab

Status
Vendor
CVE Published:
8 April 2026

What is CVE-2026-5173?

CVE-2026-5173 is a notable vulnerability identified in GitLab, which is an open-source platform widely used for software development and version control. Designed to facilitate collaboration among developers, GitLab encompasses features for code repositories, issue tracking, and continuous integration and deployment. The vulnerability arises from improper access control in various versions, allowing an authenticated user to inadvertently invoke server-side methods through websocket connections. This technical flaw could have dire implications for organizations utilizing GitLab, as it potentially opens doors for unauthorized actions that can compromise the integrity and security of their development environments.

Potential impact of CVE-2026-5173

  1. Unauthorized Access and Data Exposure: The vulnerability could enable authenticated users to perform unintended operations, risking exposure of sensitive data or critical code assets. This can lead to data leaks or unauthorized modifications in a version-controlled environment.

  2. System Compromise: By exploiting this vulnerability, attackers could execute unauthorized server-side methods. This capability might be leveraged to further compromise the system, potentially allowing attackers to escalate privileges or launch more severe attacks against the network.

  3. Operational Disruptions: With the potential for unauthorized changes and data manipulation, organizations may face significant operational risks, including disruption of development workflows, delays in project timelines, and the costs associated with incident response and remediation efforts.

Affected Version(s)

GitLab 16.9.6 < 18.8.9

GitLab 18.9 < 18.9.5

GitLab 18.10 < 18.10.3

References

CVSS V3.1

Score:
8.5
Severity:
HIGH
Confidentiality:
High
Integrity:
Low
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

This vulnerability has been discovered internally by GitLab team member Simon Tomlinson
.