SB2026031246 - Multiple vulnerabilities in GitLab Community Edition (CE) and Enterprise Edition (EE)
Published: March 12, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 15 secuirty vulnerabilities.
1) Missing Authorization (CVE-ID: CVE-2026-1663)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to improper authorization validation in the group import process. A remote user can create labels in private projects.
2) Missing Authorization (CVE-ID: CVE-2025-12704)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to improper authorization validation in Virtual Registry. A remote user can access Virtual Registry data in groups where they are not members.
3) Use of Incorrectly-Resolved Name or Reference (CVE-ID: CVE-2026-1230)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to incorrect validation of branch references in repository download. A remote user can cause repository downloads to contain different code than displayed in the web interface.
4) Improper Removal of Sensitive Information Before Storage or Transfer (CVE-ID: CVE-2026-1732)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to improper filtering in inaccessible issues. A remote user can gain unauthorized access to sensitive information on the system.
5) Improper access control (CVE-ID: CVE-2026-0602)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper filtering in the snippet rendering process. A remote user can bypass implemented security restrictions and disclose metadata from private issues, merge requests, epics, milestones or commits.
6) Improper access control (CVE-ID: CVE-2025-12555)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in runners API. A remote user can bypass implemented security restrictions and access previous pipeline job information on projects with repository and CI/CD disabled.
7) CRLF injection (CVE-ID: CVE-2026-3848)
The vulnerability allows a remote attacker to inject arbitrary data in server response.
The vulnerability exists due to insufficient validation of attacker-supplied data in import functionality. A remote user can pass specially crafted data to the application containing CR-LF characters and modify application behavior.
8) Allocation of Resources Without Limits or Throttling (CVE-ID: CVE-2025-12576)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper handling of webhook response data. A remote user can pass specially crafted input to the application and cause a denial of service condition on the target system.
9) Allocation of Resources Without Limits or Throttling (CVE-ID: CVE-2025-13690)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation on webhook custom header names. A remote user can pass specially crafted input to the application and cause a denial of service condition on the target system.
10) Input validation error (CVE-ID: CVE-2025-14513)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in protected branches API. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
11) Allocation of Resources Without Limits or Throttling (CVE-ID: CVE-2025-13929)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to allocation of resources without limits or throttling in repository archive endpoint. A remote attacker can pass specially crafted input to the application and cause a denial of service condition on the target system.
12) Uncontrolled Recursion (CVE-ID: CVE-2026-1069)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to uncontrolled recursion in GraphQL API. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
13) Cross-site scripting (CVE-ID: CVE-2026-1090)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in Markdown placeholder processing. A remote user can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
14) Improper Encoding or Escaping of Output (CVE-ID: CVE-2025-12697)
The vulnerability allows a remote user to compromise the target system.
The vulnerability exists due to improper encoding or escaping of output in Datadog integration. A remote administrator can reveal Datadog API credentials.
15) Improper Removal of Sensitive Information Before Storage or Transfer (CVE-ID: CVE-2026-1182)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to improper filtering in confidential issues. A remote user can gain unauthorized access to confidential issue titles created in public projects.
Remediation
Install update from vendor's website.