CVE-2026-0723Unchecked Return Value in Gitlab

Severity
7.4HIGHNVD
EPSS
0.0%
top 98.58%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 22

Description

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.6 before 18.6.4, 18.7 before 18.7.2, and 18.8 before 18.8.2 that could have allowed an individual with existing knowledge of a victim's credential ID to bypass two-factor authentication by submitting forged device responses.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:NExploitability: 2.2 | Impact: 5.2

Affected Packages5 packages

CVEListV5gitlab/gitlab18.618.6.4+2
NVDgitlab/gitlab18.6.018.6.4+2
debiandebian/gitlab
gitlabgitlab/gitlab

🔴Vulnerability Details

2
GHSA
GHSA-gr75-mcwq-hxv5: GitLab has remediated an issue in GitLab CE/EE affecting all versions from 182026-01-22
OSV
CVE-2026-0723: GitLab has remediated an issue in GitLab CE/EE affecting all versions from 182026-01-22

📋Vendor Advisories

2
GitLab
CVE-2026-0723: GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.6 before 18.6.4, 18.7 before 18.7.2, and 18.8 before 18.8.2 that could h2026-01-22
Debian
CVE-2026-0723: gitlab - GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.6 ...2026

🕵️Threat Intelligence

2
Bleepingcomputer
GitLab warns of high-severity 2FA bypass, denial-of-service flaws2026-01-21
Wiz
CVE-2026-0723 Impact, Exploitability, and Mitigation Steps | Wiz