#VU124600 Improper Encoding or Escaping of Output in Gitlab Community Edition and GitLab Enterprise Edition - CVE-2026-2995

 

#VU124600 Improper Encoding or Escaping of Output in Gitlab Community Edition and GitLab Enterprise Edition - CVE-2026-2995

Published: March 25, 2026 / Updated: March 25, 2026


Vulnerability identifier: #VU124600
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U/U:Clear
CVE-ID: CVE-2026-2995
CWE-ID: CWE-116
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Gitlab Community Edition
GitLab Enterprise Edition
Software vendor:
GitLab, Inc

Description

The vulnerability allows a remote user to add email addresses to targeted user accounts.

The vulnerability exists due to improper sanitization of HTML content in the vulnerability report when rendering content. A remote user can inject malicious HTML content into a vulnerability report, which when viewed by another user, can add email addresses to their account.


Remediation

Install security update from vendor's website.

External links