The GitLabwatch hub is a vendor-specific view inside ITECS MSP Threat Radar. We pull the latest security advisories, incidents, and known-exploited CVEs directly from the official feeds below, score each one for MSP relevance, and surface what's most likely to need attention this week.
Confirm whether recent GitLab activity overlaps with your environment.
Prioritize advisories by MSP-relevance score, severity, and status.
Turn the signal into an assessment, briefing, or managed-service engagement with ITECS.
At a glance
Tracked
5
Active
4
Featured
4
Unique CVEs
5
Most recent entry
Apr 22, 2026, 12:16 PM
Feed refreshes daily · 5:15 a.m. Central
Sources·CISA KEV and NVD (product vendor coverage)
"Most recent entry" is the newest item the upstream feed has published — not our sync time.
Watch items
Recent GitLab watch items
Showing the 5 most recent items, newest first. Each row links to the official advisory.
5 rows · sorted newest first
Operations view
gitlab vulnerability (CVE-2026-5816)
HIGH
watchNVDCVE-2026-5816
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.10 before 18.10.4 and 18.11 before 18.11.1 that could have allowed an unauthenticated user to execute arbitrary JavaScript in a user's browser session due to improper path validation under certain conditions.
GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability
critical
activeCISA KEVCVE-2021-39935
GitLab Community and Enterprise Editions contain a server-side request forgery vulnerability which could allow unauthorized external users to perform Server Side Requests via the CI Lint API.
GitLab Community and Enterprise Editions Improper Access Control Vulnerability
critical
activeCISA KEVCVE-2023-7028
GitLab Community and Enterprise Editions contain an improper access control vulnerability. This allows an attacker to trigger password reset emails to be sent to an unverified email address to ultimately facilitate an account takeover.
GitLab Community and Enterprise Editions Remote Code Execution Vulnerability
critical
activeCISA KEVCVE-2021-22205
GitHub Community and Enterprise Editions that utilize the ability to upload images through GitLab Workhorse are vulnerable to remote code execution. Workhorse passes image file extensions through ExifTool, which improperly validates the image files. Known ransomware use: Known.
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.10 before 18.10.4 and 18.11 before 18.11.1 that could have allowed an unauthenticated user to execute arbitrary JavaScript in a user's browser session due to improper path validation under certain conditions.
gitlab
HIGHCVE-2026-5816
Watch
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 0.0% EPSS.
GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability
GitLab Community and Enterprise Editions contain a server-side request forgery vulnerability which could allow unauthorized external users to perform Server Side Requests via the CI Lint API.
Community and Enterprise Editions
criticalCVE-2021-39935
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 54.6% EPSS.
GitLab Community and Enterprise Editions Improper Access Control Vulnerability
GitLab Community and Enterprise Editions contain an improper access control vulnerability. This allows an attacker to trigger password reset emails to be sent to an unverified email address to ultimately facilitate an account takeover.
GitLab CE/EE
criticalCVE-2023-7028
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 93.9% EPSS.
GitLab Community and Enterprise Editions Remote Code Execution Vulnerability
GitHub Community and Enterprise Editions that utilize the ability to upload images through GitLab Workhorse are vulnerable to remote code execution. Workhorse passes image file extensions through ExifTool, which improperly validates the image files. Known ransomware use: Known.
Community and Enterprise Editions
criticalCVE-2021-22205
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 94.5% EPSS.
It is the GitLab-specific view inside ITECS Threat Radar, built to track recent advisories, incidents, and watch items that may affect Dallas-area business operations.
How should teams use the GitLab watch page?
Use it to confirm whether current GitLab issues overlap with your environment, prioritize remediation, and decide whether you need an assessment, managed security follow-through, or vendor-specific hardening work.
Can ITECS help respond to GitLab security issues?
Yes. ITECS can help map GitLab advisories against your systems, validate affected services, prioritize remediation, and connect the issue to broader managed cybersecurity or managed IT workflows.