GitLab threat watch

GitLab CVE coverage for self-managed DevSecOps, source-code management, CI/CD, and exposed developer platforms.

Vendor watch hub

What this page covers

The GitLabwatch hub is a vendor-specific view inside ITECS MSP Threat Radar. We pull the latest security advisories, incidents, and known-exploited CVEs directly from the official feeds below, score each one for MSP relevance, and surface what's most likely to need attention this week.

  • Confirm whether recent GitLab activity overlaps with your environment.
  • Prioritize advisories by MSP-relevance score, severity, and status.
  • Turn the signal into an assessment, briefing, or managed-service engagement with ITECS.

At a glance

Tracked

5

Active

4

Featured

4

Unique CVEs

5

Most recent entry

Apr 22, 2026, 12:16 PM

Feed refreshes daily · 5:15 a.m. Central

Sources·CISA KEV and NVD (product vendor coverage)

"Most recent entry" is the newest item the upstream feed has published — not our sync time.

Watch items

Recent GitLab watch items

Showing the 5 most recent items, newest first. Each row links to the official advisory.

5 rows · sorted newest first

Operations view

gitlab vulnerability (CVE-2026-5816)

HIGH
watchNVDCVE-2026-5816

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.10 before 18.10.4 and 18.11 before 18.11.1 that could have allowed an unauthenticated user to execute arbitrary JavaScript in a user's browser session due to improper path validation under certain conditions.

Apr 22, 2026, 12:16 PMOfficial source

GitLab Server-Side Request Forgery (SSRF) Vulnerability

critical
activeCISA KEVCVE-2021-22175

GitLab contains a server-side request forgery (SSRF) vulnerability when requests to the internal network for webhooks are enabled.

Feb 17, 2026, 6:00 PMOfficial source

GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability

critical
activeCISA KEVCVE-2021-39935

GitLab Community and Enterprise Editions contain a server-side request forgery vulnerability which could allow unauthorized external users to perform Server Side Requests via the CI Lint API.

Feb 2, 2026, 6:00 PMOfficial source

GitLab Community and Enterprise Editions Improper Access Control Vulnerability

critical
activeCISA KEVCVE-2023-7028

GitLab Community and Enterprise Editions contain an improper access control vulnerability. This allows an attacker to trigger password reset emails to be sent to an unverified email address to ultimately facilitate an account takeover.

Apr 30, 2024, 7:00 PMOfficial source

GitLab Community and Enterprise Editions Remote Code Execution Vulnerability

critical
activeCISA KEVCVE-2021-22205

GitHub Community and Enterprise Editions that utilize the ability to upload images through GitLab Workhorse are vulnerable to remote code execution. Workhorse passes image file extensions through ExifTool, which improperly validates the image files. Known ransomware use: Known.

Nov 2, 2021, 7:00 PMOfficial source

Related vendors

Other cloud vendors in the radar

Vendor watch FAQ

Common questions

What is the GitLab threat watch page?

It is the GitLab-specific view inside ITECS Threat Radar, built to track recent advisories, incidents, and watch items that may affect Dallas-area business operations.

How should teams use the GitLab watch page?

Use it to confirm whether current GitLab issues overlap with your environment, prioritize remediation, and decide whether you need an assessment, managed security follow-through, or vendor-specific hardening work.

Can ITECS help respond to GitLab security issues?

Yes. ITECS can help map GitLab advisories against your systems, validate affected services, prioritize remediation, and connect the issue to broader managed cybersecurity or managed IT workflows.