Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Microsoft AI Generates Commands & Processes Telemetry
May 14, 2026
Critical GitLab Flaws Allow XSS and Unauthenticated Do
May 14, 2026
Hackers Exploit HWMonitor to Load Malicious Abuse Legitimate
May 14, 2026
Home/CyberSecurity News/Critical GitLab Flaws Allow XSS and Unauthenticated Do
CyberSecurity News

Critical GitLab Flaws Allow XSS and Unauthenticated Do

Threat actors routinely target infrastructure weaknesses, and a recently identified set of critical vulnerabilities in GitLab now provides a dangerous pathway for exploitation. On May 13, 2026,...

David kimber
David kimber
May 14, 2026 2 Min Read
2 0

Threat actors routinely target infrastructure weaknesses, and a recently identified set of critical vulnerabilities in GitLab now provides a dangerous pathway for exploitation.

On May 13, 2026, GitLab rolled out emergency security updates to address multiple high-severity flaws.

These bugs could allow attackers to hijack browser sessions or completely crash essential CI/CD pipelines.

If you manage a self-hosted GitLab instance, patching is no longer a scheduled task; it is an immediate crisis response.

The most alarming issues in this release are a series of severe Cross-Site Scripting (XSS) vulnerabilities.

Flaws like CVE-2026-7481 and CVE-2026-5297 allow attackers to inject malicious JavaScript into analytics dashboards and global search fields.

When an unsuspecting developer views these compromised pages, the script executes automatically in their browser.

This gives attackers a silent backdoor to hijack sessions, steal sensitive tokens, or manipulate code repositories under the guise of an authenticated user.

Just as dangerously, GitLab fixed several unauthenticated Denial-of-Service (DoS) vulnerabilities affecting core operations.

CVE-2026-1659 and CVE-2025-14870 are particularly concerning because they require absolutely no authentication to exploit.

By sending a flood of specially crafted payloads to the CI/CD job update API or Duo Workflows API, an anonymous attacker can quickly overwhelm the system.

This effectively paralyzes a development team’s ability to push updates, deploy code, or manage internal workflows.

High-Severity Vulnerabilities

To help security teams prioritize remediation, GitLab highlighted the most critical vulnerabilities addressed in this patch release.

CVE Vulnerability Description Severity CVSS Score
CVE-2026-7481 XSS in Analytics dashboard chart rendering High 8.7
CVE-2026-5297 XSS in global search High 8.7
CVE-2026-6073 XSS in Duo Agent output rendering High 8.7
CVE-2026-1659 Unauthenticated DoS in CI/CD job update API High 7.5
CVE-2025-14870 Unauthenticated DoS in Duo Workflows API High 7.5
CVE-2025-14869 Unauthenticated DoS in internal API endpoints High 7.5
CVE-2026-1322 Improper Authorization in GraphQL token scope Medium 6.8

Updating your environment is the only reliable way to lock out potential threat actors.

GitLab has already applied these fixes to its cloud-hosted platforms, meaning this threat directly targets self-managed Community Edition (CE) and Enterprise Edition (EE) servers.

Administrators must immediately upgrade their systems to versions 18.11.3, 18.10.6, or 18.9.7 to secure their infrastructure.

When planning your emergency maintenance window, be aware of deployment impacts.

Single-node instances will experience mandatory downtime during the upgrade process because critical database migrations must finish before GitLab can restart.

Fortunately, organizations running multi-node environments can execute zero-downtime upgrades by following standard deployment procedures.

Don’t wait for threat actors to weaponize these flaws; secure your development pipelines today.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityThreatVulnerability

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Hackers Exploit HWMonitor to Load Malicious Abuse Legitimate

Next Post

Microsoft AI Generates Commands & Processes Telemetry

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Langflow CVE-2026-33017 Exploited to Steal AWS Keys and Deploy
May 14, 2026
Packagist: Urgent Composer Update After GitHub Token Leak
May 14, 2026
Seedworm APT Abuses Fortemedia & SentinelOne Signed Binaries
May 14, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us