SB2026031246 - Multiple vulnerabilities in GitLab Community Edition (CE) and Enterprise Edition (EE)



SB2026031246 - Multiple vulnerabilities in GitLab Community Edition (CE) and Enterprise Edition (EE)

Published: March 12, 2026

Security Bulletin ID SB2026031246
Severity
Medium
Patch available
YES
Number of vulnerabilities 15
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 87% Low 13%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 15 secuirty vulnerabilities.


1) Missing Authorization (CVE-ID: CVE-2026-1663)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to improper authorization validation in the group import process. A remote user can create labels in private projects.


2) Missing Authorization (CVE-ID: CVE-2025-12704)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to improper authorization validation in Virtual Registry. A remote user can access Virtual Registry data in groups where they are not members.


3) Use of Incorrectly-Resolved Name or Reference (CVE-ID: CVE-2026-1230)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to incorrect validation of branch references in repository download. A remote user can cause repository downloads to contain different code than displayed in the web interface.


4) Improper Removal of Sensitive Information Before Storage or Transfer (CVE-ID: CVE-2026-1732)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to improper filtering in inaccessible issues. A remote user can gain unauthorized access to sensitive information on the system.


5) Improper access control (CVE-ID: CVE-2026-0602)

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper filtering in the snippet rendering process. A remote user can bypass implemented security restrictions and disclose metadata from private issues, merge requests, epics, milestones or commits.


6) Improper access control (CVE-ID: CVE-2025-12555)

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions in runners API. A remote user can bypass implemented security restrictions and access previous pipeline job information on projects with repository and CI/CD disabled.


7) CRLF injection (CVE-ID: CVE-2026-3848)

The vulnerability allows a remote attacker to inject arbitrary data in server response.

The vulnerability exists due to insufficient validation of attacker-supplied data in import functionality. A remote user can pass specially crafted data to the application containing CR-LF characters and modify application behavior.


8) Allocation of Resources Without Limits or Throttling (CVE-ID: CVE-2025-12576)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper handling of webhook response data. A remote user can pass specially crafted input to the application and cause a denial of service condition on the target system.


9) Allocation of Resources Without Limits or Throttling (CVE-ID: CVE-2025-13690)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation on webhook custom header names. A remote user can pass specially crafted input to the application and cause a denial of service condition on the target system.


10) Input validation error (CVE-ID: CVE-2025-14513)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in protected branches API. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.


11) Allocation of Resources Without Limits or Throttling (CVE-ID: CVE-2025-13929)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to allocation of resources without limits or throttling in repository archive endpoint. A remote attacker can pass specially crafted input to the application and cause a denial of service condition on the target system.


12) Uncontrolled Recursion (CVE-ID: CVE-2026-1069)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to uncontrolled recursion in GraphQL API. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.


13) Cross-site scripting (CVE-ID: CVE-2026-1090)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in Markdown placeholder processing. A remote user can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


14) Improper Encoding or Escaping of Output (CVE-ID: CVE-2025-12697)

The vulnerability allows a remote user to compromise the target system.

The vulnerability exists due to improper encoding or escaping of output in Datadog integration. A remote administrator can reveal Datadog API credentials.


15) Improper Removal of Sensitive Information Before Storage or Transfer (CVE-ID: CVE-2026-1182)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to improper filtering in confidential issues. A remote user can gain unauthorized access to confidential issue titles created in public projects.


Remediation

Install update from vendor's website.