GitLab threat watch

GitLab CVE coverage for self-managed DevSecOps, source-code management, CI/CD, and exposed developer platforms.

Vendor watch hub

What this page covers

The GitLabwatch hub is a vendor-specific view inside ITECS MSP Threat Radar. We pull the latest security advisories, incidents, and known-exploited CVEs directly from the official feeds below, score each one for MSP relevance, and surface what's most likely to need attention this week.

  • Confirm whether recent GitLab activity overlaps with your environment.
  • Prioritize advisories by MSP-relevance score, severity, and status.
  • Turn the signal into an assessment, briefing, or managed-service engagement with ITECS.

At a glance

Tracked

10

Active

4

Featured

4

Unique CVEs

10

Most recent entry

May 14, 2026, 1:16 AM

Feed refreshes daily · 5:15 a.m. Central

Sources·CISA KEV and NVD (product vendor coverage)

"Most recent entry" is the newest item the upstream feed has published — not our sync time.

Watch items

Recent GitLab watch items

Showing the 10 most recent items, newest first. Each row links to the official advisory.

10 rows · sorted newest first

Operations view

gitlab vulnerability (CVE-2026-1322)

HIGH
watchNVDCVE-2026-1322

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.0 before 18.9.7, 18.10 before 18.10.6, and 18.11 before 18.11.3 that could have allowed an authenticated user with a read_api scoped OAuth application to create issues and add comments to issues in private projects due to improper authorization.

May 14, 2026, 1:16 AMOfficial source

gitlab vulnerability (CVE-2026-1184)

HIGH
watchNVDCVE-2026-1184

GitLab has remediated an issue in GitLab EE affecting all versions from 11.9 before 18.9.7, 18.10 before 18.10.6, and 18.11 before 18.11.3 that could have allowed an unauthenticated user to cause denial of service by uploading a specially crafted file due to improper validation.

May 14, 2026, 1:16 AMOfficial source

gitlab vulnerability (CVE-2026-5816)

HIGH
watchNVDCVE-2026-5816

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.10 before 18.10.4 and 18.11 before 18.11.1 that could have allowed an unauthenticated user to execute arbitrary JavaScript in a user's browser session due to improper path validation under certain conditions.

Apr 22, 2026, 12:16 PMOfficial source

GitLab Server-Side Request Forgery (SSRF) Vulnerability

critical
activeCISA KEVCVE-2021-22175

GitLab contains a server-side request forgery (SSRF) vulnerability when requests to the internal network for webhooks are enabled.

Feb 17, 2026, 6:00 PMOfficial source

GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability

critical
activeCISA KEVCVE-2021-39935

GitLab Community and Enterprise Editions contain a server-side request forgery vulnerability which could allow unauthorized external users to perform Server Side Requests via the CI Lint API.

Feb 2, 2026, 6:00 PMOfficial source

GitLab Community and Enterprise Editions Improper Access Control Vulnerability

critical
activeCISA KEVCVE-2023-7028

GitLab Community and Enterprise Editions contain an improper access control vulnerability. This allows an attacker to trigger password reset emails to be sent to an unverified email address to ultimately facilitate an account takeover.

Apr 30, 2024, 7:00 PMOfficial source

GitLab Community and Enterprise Editions Remote Code Execution Vulnerability

critical
activeCISA KEVCVE-2021-22205

GitHub Community and Enterprise Editions that utilize the ability to upload images through GitLab Workhorse are vulnerable to remote code execution. Workhorse passes image file extensions through ExifTool, which improperly validates the image files. Known ransomware use: Known.

Nov 2, 2021, 7:00 PMOfficial source

gitlab vulnerability (CVE-2017-12426)

HIGH
watchNVDCVE-2017-12426

GitLab Community Edition (CE) and Enterprise Edition (EE) before 8.17.8, 9.0.x before 9.0.13, 9.1.x before 9.1.10, 9.2.x before 9.2.10, 9.3.x before 9.3.10, and 9.4.x before 9.4.4 might allow remote attackers to execute arbitrary code via a crafted SSH URL in a project import.

Aug 14, 2017, 4:29 PMOfficial source

gitlab vulnerability (CVE-2016-9469)

HIGH
watchNVDCVE-2016-9469

Multiple versions of GitLab expose a dangerous method to any authenticated user that could lead to the deletion of all Issue and MergeRequest objects on a GitLab instance. For GitLab instances with publicly available projects this vulnerability could be exploited by an unauthenticated user. A fix was included in versions 8.14.3, 8.13.8, and 8.12.11, which were released on December 5th 2016 at 3:59 PST. The GitLab versions vulnerable to this are 8.13.0, 8.13.0-ee, 8.13.1, 8.13.1-ee, 8.13.2, 8.13.2-ee, 8.13.3, 8.13.3-ee, 8.13.4, 8.13.4-ee, 8.13.5, 8.13.5-ee, 8.13.6, 8.13.6-ee, 8.13.7, 8.14.0, 8.14.0-ee, 8.14.1, 8.14.2, and 8.14.2-ee.

Mar 27, 2017, 9:59 PMOfficial source

gitlab vulnerability (CVE-2016-4340)

HIGH
watchNVDCVE-2016-4340

The impersonate feature in Gitlab 8.7.0, 8.6.0 through 8.6.7, 8.5.0 through 8.5.11, 8.4.0 through 8.4.9, 8.3.0 through 8.3.8, and 8.2.0 through 8.2.4 allows remote authenticated users to "log in" as any other user via unspecified vectors.

Jan 23, 2017, 3:59 PMOfficial source

Related vendors

Other cloud vendors in the radar

Vendor watch FAQ

Common questions

What is the GitLab threat watch page?

It is the GitLab-specific view inside ITECS Threat Radar, built to track recent advisories, incidents, and watch items that may affect Dallas-area business operations.

How should teams use the GitLab watch page?

Use it to confirm whether current GitLab issues overlap with your environment, prioritize remediation, and decide whether you need an assessment, managed security follow-through, or vendor-specific hardening work.

Can ITECS help respond to GitLab security issues?

Yes. ITECS can help map GitLab advisories against your systems, validate affected services, prioritize remediation, and connect the issue to broader managed cybersecurity or managed IT workflows.