Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
Heliaca 970x120 1

GitLab Security Update Fixes Critical Vulnerabilities CVE-2026-0723

21 January 2026 18:32

An urgent security update has been released by GitLab for the Community (CE) and Enterprise (EE) editions to address several high-severity vulnerabilities. These vulnerabilities expose installations to potential denial-of-service (DoS) attacks and authentication bypass attempts. Administrators are strongly advised to proceed with the update immediately, as the affected versions are 18.8.2, 18.7.2, and 18.6.4.

The update in question addresses five specific CVEs, including API-level exploits and a cunning method to bypass two-factor authentication (2FA). “GitLab has fixed an issue that could have allowed an attacker with a victim’s credentials to bypass two-factor authentication by sending spoofed device responses,” the advisory explains .

One of the most alarming vulnerabilities in the batch is CVE-2026-0723, an “unchecked return value” issue that compromises user security. This flaw, with a CVSS score of 7.4, is extremely dangerous as it compromises the mechanism for protecting accounts from compromised passwords . Affected versions include all versions from 18.6 to 18.6.4, 18.7 to 18.7.2, and 18.8 to 18.8.2.

The update also fixes several other bugs that could allow attackers to crash GitLab instances:

  • Jira Connect (CVE-2025-13927): An unauthenticated user could trigger a denial of service by “sending forged requests with invalid authentication data” to the Jira Connect integration.
  • API Releases (CVE-2025-13928): Improper authorization validation allowed unauthenticated users to cause a denial of service via the Releases API.
  • Wiki Loop (CVE-2025-13335): Authenticated users may create “malformed Wiki documents that bypass loop detection,” causing the system to enter an infinite loop.
  • SSH Requests (CVE-2026-1102): An unauthenticated user could cause a denial of service by spamming “repeated and malformed SSH authentication requests.”

GitLab’s message is clear: “We strongly recommend that you immediately upgrade all self-managed GitLab installations to one of these releases.”

For administrators, the target versions are 18.8.2, 18.7.2, and 18.6.4. Failure to apply patches exposes instances to a variety of malicious attacks and potential account takeovers.

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

Massimiliano Brolli 300x300
Responsible for the RED Team of a large Telecommunications company and 4G/5G cyber security labs. He has held managerial positions ranging from ICT Risk Management to software engineering to teaching in university master's programs.
Areas of Expertise: Bug Hunting, Red Team, Cyber Intelligence & Threat Analysis, Disclosure, Cyber Warfare and Geopolitics, Ethical Hacking