Home

Description

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.6 before 18.6.4, 18.7 before 18.7.2, and 18.8 before 18.8.2 that could have allowed an individual with existing knowledge of a victim's credential ID to bypass two-factor authentication by submitting forged device responses.

PUBLISHED Reserved 2026-01-08 | Published 2026-01-22 | Updated 2026-01-23 | Assigner GitLab




HIGH: 7.4CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

Problem types

CWE-252: Unchecked Return Value

Product status

Default status
unaffected

18.6 (semver) before 18.6.4
affected

18.7 (semver) before 18.7.2
affected

18.8 (semver) before 18.8.2
affected

Credits

Thanks [ahacker1](https://hackerone.com/ahacker1) for reporting this vulnerability through our HackerOne bug bounty program finder

References

gitlab.com/gitlab-org/gitlab/-/issues/585333 (GitLab Issue #585333) issue-tracking permissions-required

hackerone.com/reports/3476052 (HackerOne Bug Bounty Report #3476052) technical-description exploit permissions-required

about.gitlab.com/...21/patch-release-gitlab-18-8-2-released/

cve.org (CVE-2026-0723)

nvd.nist.gov (CVE-2026-0723)

Download JSON