Home

Description

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 13.1 before 18.4.6, 18.5 before 18.5.4, and 18.6 before 18.6.2 that could have allowed an authenticated user to bypass WebAuthn two-factor authentication by manipulating the session state under certain conditions.

PUBLISHED Reserved 2025-10-20 | Published 2025-12-11 | Updated 2025-12-12 | Assigner GitLab




MEDIUM: 6.8CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

Problem types

CWE-288: Authentication Bypass Using an Alternate Path or Channel

Product status

Default status
unaffected

13.1 (semver) before 18.4.6
affected

18.5 (semver) before 18.5.4
affected

18.6 (semver) before 18.6.2
affected

Credits

Thanks [jcarre](https://hackerone.com/jcarre) for reporting this vulnerability through our HackerOne bug bounty program finder

References

gitlab.com/gitlab-org/gitlab/-/issues/577847 (GitLab Issue #577847) issue-tracking permissions-required

hackerone.com/reports/3322714 (HackerOne Bug Bounty Report #3322714) technical-description exploit permissions-required

about.gitlab.com/...10/patch-release-gitlab-18-6-2-released/

cve.org (CVE-2025-11984)

nvd.nist.gov (CVE-2025-11984)

Download JSON