7.4

CVE-2026-0723

Medienbericht
Exploit
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.6 before 18.6.4, 18.7 before 18.7.2, and 18.8 before 18.8.2 that could have allowed an individual with existing knowledge of a victim's credential ID to bypass two-factor authentication by submitting forged device responses.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
GitlabGitLab SwEditioncommunity Version >= 18.6.0 < 18.6.4
GitlabGitLab SwEditionenterprise Version >= 18.6.0 < 18.6.4
GitlabGitLab SwEditioncommunity Version >= 18.7.0 < 18.7.2
GitlabGitLab SwEditionenterprise Version >= 18.7.0 < 18.7.2
GitlabGitLab SwEditioncommunity Version >= 18.8.0 < 18.8.2
GitlabGitLab SwEditionenterprise Version >= 18.8.0 < 18.8.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.01% 0.009
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
cve@gitlab.com 7.4 2.2 5.2
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
CWE-252 Unchecked Return Value

The product does not check the return value from a method or function, which can prevent it from detecting unexpected states and conditions.