4.3

CVE-2026-3607

Exploit

Access Control Check Implemented After Asset is Accessed in GitLab

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.3 before 18.9.7, 18.10 before 18.10.6, and 18.11 before 18.11.3 that could have allowed an authenticated user with developer-role permissions to bypass package protection rules due to improper access control.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
GitlabGitLab SwEditioncommunity Version >= 18.3.0 < 18.9.7
GitlabGitLab SwEditionenterprise Version >= 18.3.0 < 18.9.7
GitlabGitLab SwEditioncommunity Version >= 18.10.0 < 18.10.6
GitlabGitLab SwEditionenterprise Version >= 18.10.0 < 18.10.6
GitlabGitLab SwEditioncommunity Version >= 18.11.0 < 18.11.3
GitlabGitLab SwEditionenterprise Version >= 18.11.0 < 18.11.3
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.01% 0.011
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
cve@gitlab.com 4.3 2.8 1.4
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CWE-1280 Access Control Check Implemented After Asset is Accessed

A product's hardware-based access control check occurs after the asset has been accessed.