CVE-2026-1090Cross-site Scripting in Gitlab

Severity
5.4MEDIUMNVD
EPSS
0.1%
top 77.88%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 11

Description

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 10.6 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an authenticated user, when the `markdown_placeholders` feature flag was enabled, to inject JavaScript in a browser due to improper sanitization of placeholder content in markdown processing.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NExploitability: 2.3 | Impact: 2.7

Affected Packages5 packages

CVEListV5gitlab/gitlab10.618.7.6+2
NVDgitlab/gitlab10.6.018.7.6+2
debiandebian/gitlab
gitlabgitlab/gitlab

🔴Vulnerability Details

2
OSV
CVE-2026-1090: GitLab has remediated an issue in GitLab CE/EE affecting all versions from 102026-03-11
GHSA
GHSA-qv6p-pfj5-mhj9: GitLab has remediated an issue in GitLab CE/EE affecting all versions from 102026-03-11

📋Vendor Advisories

2
GitLab
CVE-2026-1090: GitLab has remediated an issue in GitLab CE/EE affecting all versions from 10.6 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could h2026-03-11
Debian
CVE-2026-1090: gitlab - GitLab has remediated an issue in GitLab CE/EE affecting all versions from 10.6 ...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-1090 Impact, Exploitability, and Mitigation Steps | Wiz