GitLab Vulnerabilities Allow 2FA Bypass & DoS Multiple Enables
GitLab has issued critical security patches for its Community Edition (CE) and Enterprise Edition (EE), addressing five vulnerabilities across versions 18.8.2, 18.7.2, and 18.6.4. The patches resolve...
GitLab has issued critical security patches for its Community Edition (CE) and Enterprise Edition (EE), addressing five vulnerabilities across versions 18.8.2, 18.7.2, and 18.6.4.
The patches resolve issues ranging from high-severity authentication flaws to denial-of-service conditions affecting core platform functionality.
Critical 2FA Bypass Vulnerability
The most severe vulnerability is CVE-2026-0723, an unchecked return value issue in authentication services enabling two-factor authentication bypass.
An attacker with knowledge of a victim’s credential ID could bypass 2FA protections by submitting forged device responses, potentially gaining unauthorized access to user accounts.
This vulnerability affects versions 18.6 through 18.8 and carries a CVSS score of 7.4, indicating high risk for confidentiality and integrity breaches.
| CVE ID | Vulnerability Type | Severity | CVSS Score | Affected Versions | Impact |
|---|---|---|---|---|---|
| CVE-2026-0723 | Unchecked Return Value in Authentication | High | 7.4 | 18.6–18.8.x | 2FA bypass via forged device responses |
| CVE-2025-13927 | DoS in Jira Connect Integration | High | 7.5 | 11.9–18.8.x | Unauthenticated service disruption |
| CVE-2025-13928 | Incorrect Authorization in Releases API | High | 7.5 | 17.7–18.8.x | Unauthorized DoS via API endpoint |
| CVE-2025-13335 | Infinite Loop in Wiki Redirects | Medium | 6.5 | 17.1–18.8.x | Authenticated user DoS via malformed Wiki docs |
| CVE-2026-1102 | DoS in API Endpoint | Medium | 5.3 | 12.3–18.8.x | Unauthenticated DoS via SSH authentication |
Authorization and DoS Vulnerabilities
CVE-2025-13927 and CVE-2025-13928 represent critical denial-of-service threats.
CVE-2025-13927 exploits the Jira Connect integration, allowing unauthenticated users to craft malformed authentication requests that disrupt service.
CVE-2025-13928 involves incorrect authorization validation in the Releases API, enabling unauthorized DoS conditions.
Both carry CVSS scores of 7.5 and affect extensive version ranges from 11.9 to 17.7, respectively.
CVE-2025-13335 involves an infinite loop vulnerability in Wiki redirects that authenticated users can exploit by submitting malformed Wiki documents that bypass cycle detection.
CVE-2026-1102 targets the API endpoint through repeated malformed SSH authentication requests from unauthenticated sources, with a lower CVSS of 5.3 but broader affected versions from 12.3 onward.
GitLab strongly recommends immediate upgrades for all self-managed installations. GitLab.com users are already protected, and Dedicated customers require no action.
Database migrations may cause downtime on single-node instances, though multi-node deployments can implement zero-downtime procedures. Post-deploy migrations are available for version 18.7.2.
Organizations should prioritize upgrades to address the 2FA bypass vulnerability and prevent potential account compromise. Patch notifications are available via RSS feed subscription through GitLab’s security releases channel.
Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.



No Comment! Be the first one.